A Saudi Arabian Gulf man using a laptop, a masked man using a mobile phone, threats and extortion, committing illegal acts, cyber espionage, cyber attack, data theft, cyber security
A Saudi Arabian Gulf man sitting in front of a laptop, using a mobile phone, masked men standing behind, planning cyber attacks, cyber attack, data theft, cyber security
A Saudi Arabian Gulf man sitting in front of a laptop, masked men standing behind, a Saudi man exposed to loss and fraud, exposure to electronic attack, personal data theft, electronic crimes, cyber security
A Saudi Arabian Gulf man sitting in front of the laptop, masked men standing behind, a Saudi man exposed to fraud and fraud, exposure to cyber attacks, theft of important data, electronic crimes, cyber security
A Saudi Arabian Gulf man sitting in front of a laptop, talking on a mobile phone, a masked man using a mobile phone, wiretapping, infiltration through telephone networks, electronic crimes, blackmail and threats, cybersecurity
Masked man using mobile phone, sitting in front of computer screens, cyber espionage, cyber attack, data theft via the Internet, cyber crime, cyber security
Masked man using mobile phone, masked sitting in front of computer screens, cyber espionage, cyber attack, online data theft, cyber crime, cyber security
A Saudi Arabian Gulf man using a laptop, a masked man using a mobile phone, threats and extortion, committing illegal acts, cyber espionage, cyber attack, data theft, cyber security
A Saudi Arabian Gulf man sitting in front of a laptop, facial and hand gestures indicate loss and fraud, data theft, Internet attack, cyber crimes, cyber security
A Saudi Arabian Gulf man sitting in front of a laptop, a masked man watching the computer, a Saudi man who was subjected to loss and fraud, exposure to electronic attack, theft of personal data, electronic crimes, cyber security
A Saudi Arabian Gulf man sitting in front of a laptop, face and hand gestures indicating loss and fraud, a masked man pointing to the camera, exposure to important data theft, Internet attack, cyber crimes, cyber security
A Saudi Arabian Gulf man using a mobile phone, sitting in front of a laptop, a masked man using a mobile phone, threat and blackmail, infiltration through telephone networks, electronic crimes, cyber security
A Saudi Arabian Gulf man sitting in front of a laptop, face and hands gestures that indicate loss and fraud, a businessman exposed to theft of important data, threats and blackmail, cybersecurity
A Saudi Arabian Gulf man using his mobile phone, exposure to hacking and electronic attacks, security penetration, penetration of the protection, security and privacy of users, electronic crimes
A Saudi Arabian Gulf man sitting in front of a laptop, face and hand gestures indicating loss and fraud, a masked man using the silence signal, data theft, Internet attack, cyber crimes, cyber security
Black Hat Cybersecurity Exhibition, exploring innovations in the field of cybersecurity, learning about strategies to confront cyber threats, Riyadh Season activities, an organization to protect the technological ecosystem, resisting hacking and piracy in network security, protection from illegal penetration
A Saudi Arabian Gulf man makes a call through a mobile phone, exposure to hacking and electronic attacks, wiretapping, penetration of voice calls and user privacy, cyber crimes
Resisting hacking and piracy in network security, Black Hat Cybersecurity Exhibition, exploring technologies and innovations in the field of cybersecurity, reading instructions to learn about strategies to confront cyber threats, Riyadh Season activities, an organization to protect the technological ecosystem
A Saudi Arabian Gulf man using a laptop, a web developer job, online education, remote work, using social networking sites, e-marketing, completing administrative tasks and work, surfing the Internet
A Saudi Arabian Gulf man sitting in front of his laptop with gestures indicating loss, exposure to theft of passwords and personal data, system and data penetration, cyber crimes, electronic attacks, background of a hologram lock
A Saudi Arabian Gulf man using his laptop, exposure to hacking and electronic attacks, security penetration, penetration of the protection, security and privacy of users, electronic crimes
Vector for a set of applications on the mobile tablet device, cyber security shield, data protection, information privacy, electronic information protection and security, vector illustrator
Viruses and data breach, designs and drawings of a cartoon character of a Saudi Arabian Gulf man looking at the camera with angry gestures holding a mobile phone in his hand, use of modern technologies and devices, icons and symbols of programs and applications, vector illustrator
Training workshops, browsing social media, 3D illustration of a Saudi Arabian Gulf man and woman working on a laptop with happy gestures, using modern technologies and devices, vector illustrator
Browsing social media, designs and drawings of a cartoon character of a smiling Saudi Arabian Gulf man looking at the camera with gestures of pleasure holding a mobile phone in his hand, using modern technologies and devices, icons and symbols of programs and applications, vector illustrator
Using modern technologies, a Saudi Gulf Arab man wearing a traditional thobe and shemagh holds a mobile phone in his hand with body parts, head, arm and paws, blue background, motion graphics, animation, vector illustrator
Browsing social media, 3D illustration of a smiling Saudi Arabian Gulf family working on laptop with happy gestures, using modern technologies and devices, vector illustrator