Experience
Education
-
Tel Aviv University
-
Activities and Societies: Cyber Club, Law Faculty Students Council, Tel-Aviv university student council
Licenses & Certifications
Volunteer Experience
-
Counselor
One Family
- 2 years 6 months
Children
• Leading a group of bereaved teenagers as a result of terrorist attacks.
• Camps and various activities. -
Patents
-
System and method for blocking phishing attempts in computer networks
Issued US11575707B2
Systems and methods of blocking phishing attempts in a computer network, including receiving a list of assets of the computer network, wherein each asset is associated with at least one computer network address, generating at least one address permutation on the at least one computer network address of each asset of the computer network, wherein the generated at least one address permutation is different from the address associated with each asset of the computer network, receiving a…
Systems and methods of blocking phishing attempts in a computer network, including receiving a list of assets of the computer network, wherein each asset is associated with at least one computer network address, generating at least one address permutation on the at least one computer network address of each asset of the computer network, wherein the generated at least one address permutation is different from the address associated with each asset of the computer network, receiving a communication request at a gateway server of the computer network, determining a destination address of the communication request, comparing the determined destination address with the at least one address permutation, and when the determined destination address is the same as at least one address permutation, blocking the communication request at the gateway server.
Other inventorsSee patent -
System and method for detecting leaked documents on a computer network
Issued US US20210271756A1
A system and a method of obtaining a location of a document on a computer network based on a document property. The method may include: receiving at least one basic marker and an encoding function associated with the document property; generating a search term according to the encoding function, based on the at least one basic marker; providing the search term to at least one search engine and obtaining therefrom one or more search results corresponding, where each search result may include one…
A system and a method of obtaining a location of a document on a computer network based on a document property. The method may include: receiving at least one basic marker and an encoding function associated with the document property; generating a search term according to the encoding function, based on the at least one basic marker; providing the search term to at least one search engine and obtaining therefrom one or more search results corresponding, where each search result may include one or more references to locations of documents on the computer network; discovering at least one document having the document property from the one or more search results and obtaining a discovered location of the document on the computer network; and performing at least one rule-based action, according to at least one document property of the discovered document.
Other inventorsSee patent -
System and method for mitigating phishing attacks against a secured computing device
Issued US US10462180B1
A system and a method for mitigating phishing attacks against a secured computing device. The method may include: obtaining at least one first domain name; attributing a registration time stamp (RTS) associated with timing of a registration of the at least one domain name at a domain registrar; and configuring at least one perimeter module to restrict at least one data transmission between the secured computing device and a computing device that is associated with the first domain name, based…
A system and a method for mitigating phishing attacks against a secured computing device. The method may include: obtaining at least one first domain name; attributing a registration time stamp (RTS) associated with timing of a registration of the at least one domain name at a domain registrar; and configuring at least one perimeter module to restrict at least one data transmission between the secured computing device and a computing device that is associated with the first domain name, based on the RTS.
Other inventorsSee patent
Honors & Awards
-
Growjo’s Fastest Growing Company in NYC Awards (Ranked #120)
Growjo
https://growjo.com/city/New_York_City
-
The 50 Most Promising Israeli Startups - 2021 (Ranked #7)
Calcalist
https://www.calcalistech.com/ctech/articles/0,7340,L-3904570,00.html
-
40under40
TheMarker
https://www.themarker.com/magazine/EXT-INTERACTIVE-1.9272100
-
Top 20 Best Startups to Work For in Israel 2020
Dun & Bradstreet
https://www.duns100.co.il/en/rating/High_Tech/Best_Start_Up_Companies_to_work_for
-
50 Most Promising Israeli Startups 2020
Calcalist
https://www.calcalistech.com/ctech/articles/0,7340,L-3812230,00.html
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More