The culture, habits and lifestyle of a people affect the level of cybersecurity, as Theofanis Kasimis notes in an interview with Vision Network Athens for Flash.gr!

The Greek people consider it something inferior to deal with the security of their website, their network and their social media accounts.

Where did you start? What was your starting point?

When I started hacking as an amateur, I didn't have any proper guidance to point out the wrong opinion I had formed at the time about it. However, I do not regret how I started and I am not dissatisfied with the title of the most famous Greek hacker Nine years ago, on March 1, 2012, the Cybercrime Prosecution managed to locate all members of our group and arrest me at the company where I was working at the time in Nafplio. No evidence was found for the "crimes" they had accused us of. There was an order from the then Minister of Justice to arrest us. In the 320-page indictment, there is no proof of what I did since they couldn't find my digital footprint. The fact that I never touched money, even though I could have, helped me remain silent from prison today. We knew codes, PINs, and personal information of clients, but we never used them. Whenever we found any vulnerabilities, we informed the administrators to fix them. After my ordeal with the authorities, I continued working as an employee in other companies. Encouraged by people close to me who saw my passion and abilities for what I did, I decided to start my own company, Audax Cybersecurity. Today marks the 7th anniversary of Audax Cybersecurity, consisting of individuals with specialized knowledge in the field and a passion for what they do.

What is hacking? Is there hacking in a positive sense and in a negative sense?

Hacking is a process of gaining unauthorized access to data/information using various techniques. There are two categories of hacking: black hat and white hat. A black hat hacker attempts to unlawfully infiltrate a system, whereas a white hat hacker applies similar techniques to those of a black hat hacker in order to test for vulnerabilities within a system and protect it from malicious actors.

And how do we go about ethical hacking?

Ethical hacking essentially refers to the set of techniques applied by white hat hackers. It involves penetration testing to identify vulnerabilities within a network and subsequently improve them to prevent unauthorized access by malicious users.

 

How easy or how hard is it to hack?

The process of hacking is not that complex. With the advancement of technology and the development of the internet, anyone can find various sources and exploit them to cause harm to someone else.

There are differences between Greece and abroad in terms of level κυβερνοασφάλειας;

The level of cybersecurity in Greece differs from that of foreign countries. This is because in foreign countries, they dedicate sufficient time to educate themselves about the risks of the internet and strive to secure their accounts in order to prevent any attacks.

How does a people's culture, habits, lifestyle affect their perception of cyber security?

Culture, lifestyle, and the mindset of each population play a significant role in the development of cybersecurity in foreign countries. The Greek population tends to consider securing their websites, networks, and social media accounts as something inferior. If each one of us had dedicated some time to read and find preventive measures, the rates of cyber attacks would have been significantly reduced.

 

What would you advise a teenager, a voluntary organization and a state about cyber security?

In general, as Phanis, I try to keep my audience informed on social media and educate them about the scams that are occurring during this period. I believe that information plays a crucial role in tackling hacking. The more articles someone reads, the more cautious and familiar they become with the scams and phishing messages from malicious users.
Teenagers should be particularly cautious about who they communicate with and what information they disclose. They should not trust individuals they have met online and refrain from sharing their personal data with them.
Voluntary organizations and the government would be beneficial in organizing programs and informing parents on how to address any issues their children may encounter. Parents, no matter how mature they consider their children to be, should show particular interest in their online activities. Young children are unable to perceive the malicious intentions of an individual, nor can they protect themselves from them. A skilled hacker can obtain information from them using seemingly insignificant details. By employing these methods, the sense of cybersecurity in our country will be reinforced.

 

Give us a little taste of your book.

The idea and reason behind writing the "First Greek Book of Ethical Hacking" stem from the significant proliferation and demand in the market for penetration testers, as well as the lack of knowledge among these individuals. Another equally important reason for compiling this book is the widely recognized state of terror that affects many people. Therefore, I felt the need to present certain ideas in order to highlight the common causes and methods of exploiting vulnerabilities in a system. The only thing I can reveal is that this certainly won't be the last book I release!

 

A few words about Theoanis Kasimis

He was born in Athens on January 14, 1984. Since 2014, he has been running Audax Cybersecurity, one of the most well-known IT companies in the field of cybersecurity in Greece. The personnel comprising his company are well-prepared to penetrate the security of every information system, identifying security vulnerabilities with the purpose of resolving them before they can be exploited by malicious users.

Interview editor: non-profit association Vision Network Athens