{"id":640293,"date":"2024-08-22T00:00:00","date_gmt":"2024-08-22T00:00:00","guid":{"rendered":"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/"},"modified":"2024-08-22T00:00:00","modified_gmt":"2024-08-22T00:00:00","slug":"how-doxxing-went-from-revenge-to-revenue","status":"publish","type":"post","link":"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/","title":{"rendered":"How doxxing went from revenge to revenue"},"content":{"rendered":"<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"> <strong>Internet anonymity both protects and threatens our sensitive information.<\/strong> Aside from unconsented data scraping by Big Tech, doxxing is the biggest exploitation of our privacy. What started out as a method of one-on-one extortion has now become a lucrative business model, with the average culprit earning \u201cwell over six figures annually,\u201d <a target=\"_blank\" href=\"https:\/\/www.wired.com\/story\/doxing-extortion-violence-as-service\/\" style=\"\" rel=\"noopener\">according<\/a> to security researcher Jacob Larsen.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>Doxxing has many forms.<\/strong> The first, and oldest, is the publication of an individual\u2019s private information \u2014 such as name, home or email address, phone number, financial information, or workplace \u2014 online as an act of revenge. This can also be done after a failed threat to extort the individual to pay a ransom in exchange for their privacy, monetarily or otherwise.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>Keeping personal data private isn\u2019t just important to the user, it\u2019s important to the people <\/strong><strong>profiting off of it. <\/strong>Large corporations realized that they were sitting on a goldmine \u2014 raw data gathered from users or subscribers was described as <a target=\"_blank\" href=\"https:\/\/www.kearney.com\/service\/digital-analytics\/article\/is-data-really-the-new-oil\" style=\"\" rel=\"noopener\">the new oil<\/a>, a valuable source for other companies to make informed, data-led decisions. But as Voltaire (and more importantly, Uncle Ben) said, with great power comes great responsibility. These companies took loudly marketed strides to protect the data \u2014 not necessarily out of concern for the user, but out of proprietorship.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>Safe, meet safe robber.<\/strong> Doxxing experts and ransomware groups realized that they could exploit these companies twofold \u2014 threatening to leak prized databases threatens a company\u2019s revenue stream as well as their reputation, making them a lucrative target and an easy bet. A safer bet? Commissioned attacks.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>B2C doxxing:<\/strong> The Dark Web is home to many unsavory services that now include doxxing-on-demand. For as little as <a target=\"_blank\" href=\"https:\/\/www.csoonline.com\/article\/555893\/website-offers-doxing-as-a-service-and-customized-extortion.html\" style=\"\" rel=\"noopener\">USD 150<\/a>, you can order a complete profile on a person through Ran$umBin, which includes \u201cemail addresses, ISP information, known passwords, banking and credit card data, driver\u2019s license number, as well as education, medical history, court, and property records.\u201d Other less complete profiles, which include little more than a person\u2019s name, date of birth, phone number, and address run for USD 40 and USD 80.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>Bounty hunters can earn a commission by doxxing for fun.<\/strong> Some Dark Web users will post information they collected onto Ran$umBin to be verified by the administrators. If the information is proved credible, the doxxer would receive a commission, and the victim will receive an offer: For a fee, they can have their information deleted. The fee depends on which category the victim was sorted into, with average people receiving a lower price, but famous people, law enforcement agents, and sexual predators being charged more.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>Ran$umBin makes it clear that it can indeed get worse.<\/strong> In the letter sent to the victim, they warn them that: \u201cThe longer the fee remains unpaid, the longer your identity [including SSN, DOB, Tax IDs, email logins, etc.] will be public, leaving it open for people to establish bank accounts and other lines of credit with your identity.\u201d<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>Legal protection against doxxing doesn\u2019t exist in common legislation, and other doxxing <\/strong><strong>entities aren\u2019t as egalitarian as RanSumBin.<\/strong> Doxbin, the most popular doxxing website that <a target=\"_blank\" href=\"https:\/\/doxbin.com\/privacy\" style=\"\" rel=\"noopener\">describes<\/a> itself as a third-party \u201cWhitepages alternative\u201d refuses to remove any information posted on its site unless it breaks the website\u2019s <a target=\"_blank\" href=\"https:\/\/doxbin.org\/tos\" style=\"\" rel=\"noopener\">terms of service<\/a>, which only protects minors or people whose leaked information has led to threats of physical violence. \u201cIf a [post] does not break our rules, there is nothing we can do,\u201d their website states. \u201cIt is your sole responsibility to manage and uphold your online anonymity. You are not intuitively guaranteed [that] right.\u201d<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>Can you really protect yourself from being doxxed? <\/strong>Larsen interviewed Ego, a contributor in the doxxing community and member of ViLe, a cybercrime group that broke into a federal law enforcement database and ran a blackmail scheme based on information gathered from that portal. Cybersecurity measures, like \u201c not reusing passwords across apps and websites, locking social media accounts and not posting photos and personal information, and turning on multifactor authentication for as many accounts as possible\u201d are common-sense practices that can help protect you from having your information exploited, says Larsen. \u201cLet\u2019s be real,\u201d <a target=\"_blank\" href=\"https:\/\/larsencyber.com\/blog\/2024-08-07-blackhat-interviews-extorters\/\" style=\"\" rel=\"noopener\">said<\/a> Ego, \u201cno matter how careful you are, someone might still track you down.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What started out as a method of one-on-one extortion has now become a lucrative business model<\/p>\n","protected":false},"author":1,"featured_media":640294,"comment_status":"closed","ping_status":"open","sticky":false,"template":"single-feature.php","format":"standard","meta":{"_acf_changed":false,"newspack_ads_suppress_ads":false,"newspack_popups_has_disabled_popups":false,"newspack_sponsor_sponsorship_scope":"","newspack_sponsor_native_byline_display":"inherit","newspack_sponsor_native_category_display":"inherit","newspack_sponsor_underwriter_style":"inherit","newspack_sponsor_underwriter_placement":"inherit","ep_exclude_from_search":false,"_primary_brand":0,"newspack_featured_image_position":"","newspack_post_subtitle":"","newspack_article_summary_title":"Overview:","newspack_article_summary":"","newspack_hide_updated_date":false,"newspack_show_updated_date":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[7337],"tags":[8764,8763,633,134,639],"brand":[],"newspack_spnsrs_tax":[],"class_list":["post-640293","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-data-breach","tag-doxxing","tag-enterprisepm","tag-ever-given","tag-technology","wpautop","entry"],"acf":{"mongo_id":"8691c8af-9669-4eb8-a0c6-8804f9e29e16","order":"10","is_powered_by":false,"story_type":"1","photo_url":"https:\/\/ent.news\/2024\/8\/1822.jpg","photo_position":"above","homepage_title":"","full_issue_title":"","related_issue":[640278],"teaser":"What started out as a method of one-on-one extortion has now become a lucrative business model","voice_url":"https:\/\/s3.us-east-1.amazonaws.com\/ent.news\/audio\/2024\/8\/.44467ed6-499c-4e09-91c0-554b18ba6a03.mp3"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How doxxing went from revenge to revenue - EnterpriseAM Egypt<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How doxxing went from revenge to revenue\" \/>\n<meta property=\"og:description\" content=\"What started out as a method of one-on-one extortion has now become a lucrative business model\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/\" \/>\n<meta property=\"og:site_name\" content=\"EnterpriseAM Egypt\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-22T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/ent.news\/2024\/8\/1822.jpg?fit=%2C&ssl=1\" \/>\n<meta name=\"author\" content=\"enterpriseam admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"enterpriseam admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/\"},\"author\":{\"name\":\"enterpriseam admin\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#\/schema\/person\/ca597032db7e4db868359c123cec256d\"},\"headline\":\"How doxxing went from revenge to revenue\",\"datePublished\":\"2024-08-22T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/\"},\"wordCount\":708,\"publisher\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#organization\"},\"image\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/ent.news\/2024\/8\/1822.jpg?fit=%2C&ssl=1\",\"keywords\":[\"data breach\",\"doxxing\",\"EnterprisePM\",\"Ever Given\",\"technology\"],\"articleSection\":[\"TECHNOLOGY\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/\",\"url\":\"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/\",\"name\":\"How doxxing went from revenge to revenue - EnterpriseAM Egypt\",\"isPartOf\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/ent.news\/2024\/8\/1822.jpg?fit=%2C&ssl=1\",\"datePublished\":\"2024-08-22T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/ent.news\/2024\/8\/1822.jpg?fit=%2C&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/ent.news\/2024\/8\/1822.jpg?fit=%2C&ssl=1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/enterpriseam.com\/egypt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How doxxing went from revenge to revenue\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#website\",\"url\":\"https:\/\/enterpriseam.com\/egypt\/\",\"name\":\"EnterpriseAM\",\"description\":\"The State of the Nation\",\"publisher\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enterpriseam.com\/egypt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#organization\",\"name\":\"EnterpriseAM\",\"url\":\"https:\/\/enterpriseam.com\/egypt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ent.news\/internal\/240894.svg\",\"contentUrl\":\"https:\/\/ent.news\/internal\/240894.svg\",\"caption\":\"EnterpriseAM\"},\"image\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#\/schema\/person\/ca597032db7e4db868359c123cec256d\",\"name\":\"enterpriseam admin\",\"sameAs\":[\"http:\/\/enterpriseam.testing.projectsarea.com\"],\"url\":\"https:\/\/enterpriseam.com\/egypt\/author\/enterpriseam\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How doxxing went from revenge to revenue - EnterpriseAM Egypt","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/","og_locale":"en_US","og_type":"article","og_title":"How doxxing went from revenge to revenue","og_description":"What started out as a method of one-on-one extortion has now become a lucrative business model","og_url":"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/","og_site_name":"EnterpriseAM Egypt","article_published_time":"2024-08-22T00:00:00+00:00","og_image":[{"url":"https:\/\/i0.wp.com\/ent.news\/2024\/8\/1822.jpg?fit=%2C&ssl=1","type":"","width":"","height":""}],"author":"enterpriseam admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"enterpriseam admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/#article","isPartOf":{"@id":"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/"},"author":{"name":"enterpriseam admin","@id":"https:\/\/enterpriseam.com\/egypt\/#\/schema\/person\/ca597032db7e4db868359c123cec256d"},"headline":"How doxxing went from revenge to revenue","datePublished":"2024-08-22T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/"},"wordCount":708,"publisher":{"@id":"https:\/\/enterpriseam.com\/egypt\/#organization"},"image":{"@id":"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/ent.news\/2024\/8\/1822.jpg?fit=%2C&ssl=1","keywords":["data breach","doxxing","EnterprisePM","Ever Given","technology"],"articleSection":["TECHNOLOGY"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/","url":"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/","name":"How doxxing went from revenge to revenue - EnterpriseAM Egypt","isPartOf":{"@id":"https:\/\/enterpriseam.com\/egypt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/#primaryimage"},"image":{"@id":"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/ent.news\/2024\/8\/1822.jpg?fit=%2C&ssl=1","datePublished":"2024-08-22T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/#primaryimage","url":"https:\/\/i0.wp.com\/ent.news\/2024\/8\/1822.jpg?fit=%2C&ssl=1","contentUrl":"https:\/\/i0.wp.com\/ent.news\/2024\/8\/1822.jpg?fit=%2C&ssl=1"},{"@type":"BreadcrumbList","@id":"https:\/\/enterpriseam.com\/egypt\/2024\/08\/22\/how-doxxing-went-from-revenge-to-revenue\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/enterpriseam.com\/egypt\/"},{"@type":"ListItem","position":2,"name":"How doxxing went from revenge to revenue"}]},{"@type":"WebSite","@id":"https:\/\/enterpriseam.com\/egypt\/#website","url":"https:\/\/enterpriseam.com\/egypt\/","name":"EnterpriseAM","description":"The State of the Nation","publisher":{"@id":"https:\/\/enterpriseam.com\/egypt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enterpriseam.com\/egypt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enterpriseam.com\/egypt\/#organization","name":"EnterpriseAM","url":"https:\/\/enterpriseam.com\/egypt\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enterpriseam.com\/egypt\/#\/schema\/logo\/image\/","url":"https:\/\/ent.news\/internal\/240894.svg","contentUrl":"https:\/\/ent.news\/internal\/240894.svg","caption":"EnterpriseAM"},"image":{"@id":"https:\/\/enterpriseam.com\/egypt\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enterpriseam.com\/egypt\/#\/schema\/person\/ca597032db7e4db868359c123cec256d","name":"enterpriseam admin","sameAs":["http:\/\/enterpriseam.testing.projectsarea.com"],"url":"https:\/\/enterpriseam.com\/egypt\/author\/enterpriseam\/"}]}},"featured_image_src":"https:\/\/i0.wp.com\/ent.news\/2024\/8\/1822.jpg?resize=600%2C400&ssl=1","featured_image_src_square":"https:\/\/i0.wp.com\/ent.news\/2024\/8\/1822.jpg?resize=600%2C600&ssl=1","author_info":{"display_name":"enterpriseam admin","author_link":"https:\/\/enterpriseam.com\/egypt\/author\/enterpriseam\/"},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/ent.news\/2024\/8\/1822.jpg?fit=%2C&ssl=1","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":675059,"url":"https:\/\/enterpriseam.com\/egypt\/2025\/11\/06\/the-promise-and-perils-of-new-web-browsers\/","url_meta":{"origin":640293,"position":0},"title":"The promise and perils of new web browsers","author":"enterpriseam admin","date":"6 November 2025","format":false,"excerpt":"A single webpage can compromise your entire company","rel":"","context":"In &quot;FOR YOUR COMMUTE&quot;","block_context":{"text":"FOR YOUR COMMUTE","link":"https:\/\/enterpriseam.com\/egypt\/category\/for-your-commute\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/ent.news\/2025\/11\/541.jpg?fit=%2C&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":659707,"url":"https:\/\/enterpriseam.com\/egypt\/2025\/01\/30\/the-tradeoff-between-convenience-and-security-in-the-digital-age\/","url_meta":{"origin":640293,"position":1},"title":"The tradeoff between convenience and security in the digital age","author":"enterpriseam admin","date":"30 January 2025","format":false,"excerpt":"We\u2019re concerned about our data privacy, yet we readily share personal information for the sake of convenience","rel":"","context":"In &quot;TECHNOLOGY&quot;","block_context":{"text":"TECHNOLOGY","link":"https:\/\/enterpriseam.com\/egypt\/category\/technology\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/ent.news\/2025\/1\/2078.jpg?fit=%2C&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":601417,"url":"https:\/\/enterpriseam.com\/egypt\/2019\/02\/27\/foreign-ministry-denies-signing-eu-agreement-on-citizen-information-exchange\/","url_meta":{"origin":640293,"position":2},"title":"Foreign Ministry denies signing EU agreement on citizen information exchange","author":"enterpriseam admin","date":"27 February 2019","format":false,"excerpt":"The Foreign Ministry has issued a staunch denial of what it calls rumors alleging that it signed an agreement with the EU to exchange sensitive personal information about citizens, including name, race, political ideology, religious views, syndicate membership and health status, according to Al Shorouk. The rumor started circulating on\u2026","rel":"","context":"In &quot;National Security&quot;","block_context":{"text":"National Security","link":"https:\/\/enterpriseam.com\/egypt\/category\/national-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/ent.news\/internal\/536550.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":594740,"url":"https:\/\/enterpriseam.com\/egypt\/2019\/09\/05\/how-emerging-economies-can-harness-the-power-of-big-healthcare-data\/","url_meta":{"origin":640293,"position":3},"title":"How emerging economies can harness the power of big healthcare data","author":"enterpriseam admin","date":"5 September 2019","format":false,"excerpt":"How emerging economies can harness the power of big healthcare data: Emerging economies must avoid the so-called \u201cData Rich Information Poor\u201d syndrome if they are to fully benefit from the ongoing data boom in the healthcare sector, Rwandan Health Minister Noella Bigirimana writes for the World Economic Forum. Data generation\u2026","rel":"","context":"In &quot;THE MACRO PICTURE&quot;","block_context":{"text":"THE MACRO PICTURE","link":"https:\/\/enterpriseam.com\/egypt\/category\/the-macro-picture\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/ent.news\/2020\/4\/308.jpg?fit=%2C&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":579532,"url":"https:\/\/enterpriseam.com\/egypt\/2022\/11\/06\/the-airport-chaos-of-the-summer-of-revenge-in-numbers-veggies-are-taking-a-toll-on-the-environment\/","url_meta":{"origin":640293,"position":4},"title":"The airport chaos of the Summer of Revenge, in numbers + Veggies are taking a toll on the environment","author":"enterpriseam admin","date":"6 November 2022","format":false,"excerpt":"Some of the world\u2019s biggest airports saw the worst flight delays this summer, the WallStreet Journal reports, citing data from flight-data specialist FlightAware tracking flights between 1 June and 24 July. At the top of the list: Toronto Pearson International and Montr\u00e9al-Trudeau International Airport, which each saw more than half\u2026","rel":"","context":"In &quot;FOR YOUR COMMUTE&quot;","block_context":{"text":"FOR YOUR COMMUTE","link":"https:\/\/enterpriseam.com\/egypt\/category\/for-your-commute\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/ent.news\/2022\/11\/591.jpg?fit=%2C&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":560616,"url":"https:\/\/enterpriseam.com\/egypt\/2021\/03\/07\/revenge-of-the-luddites-part-iii-chapter-ii-vezeeta-strikes-back\/","url_meta":{"origin":640293,"position":5},"title":"Revenge of the Luddites, Part III: Chapter II: Vezeeta strikes back","author":"enterpriseam admin","date":"7 March 2021","format":false,"excerpt":"Vezeeta has denied that it has broken the law with its newly-launched e-pharmacy business after the Pharmacists Syndicate last month accused the company of illegally selling products online. In a statement (pdf) issued Thursday, the digital healthcare platform rejected the syndicate\u2019s claims that it sells meds without a pharmacy license,\u2026","rel":"","context":"In &quot;DISPUTE WATCH&quot;","block_context":{"text":"DISPUTE WATCH","link":"https:\/\/enterpriseam.com\/egypt\/category\/dispute-watch\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/ent.news\/2021\/3\/111.jpg?fit=%2C&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/posts\/640293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/comments?post=640293"}],"version-history":[{"count":0,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/posts\/640293\/revisions"}],"acf:post":[{"embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/afternoon\/640278"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/media\/640294"}],"wp:attachment":[{"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/media?parent=640293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/categories?post=640293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/tags?post=640293"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/brand?post=640293"},{"taxonomy":"newspack_spnsrs_tax","embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/newspack_spnsrs_tax?post=640293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}