Forum Replies Created
- June 2, 2020 at 11:48 in reply to: Even during the COVID-19 pandemic, Iran and Israel continue to trade cyber shots #6864
It is possible that the first attack was not from Israel, nor the second from Iran. Unfortunately attribution can be tricky. This is an element of world war III, it is a cold war utilising cyber warfare targeting economies and stability.June 1, 2020 at 18:17 in reply to: The George Floyd controversy has been taken into cyberspace #6861
Technology has changed a lot of aspects of our lives, moving them to the virtual world. As u mentioned in ur article revolutions have generally moved from the street to social media platforms online.
While cyber attacks may be illegal, some may have noble intentions, such as exposing the truth! Some news reports for instance produced medical reports claiming that Floyd died of natural causes, while video footage from a mobile phone showed a different story (the truth).
Cyber attacks even if they have good intentions, can be easily manipulated to create and/or spread chaos. The aftermath of the breach saw demonstrations n stores being burnt n robbed.February 26, 2020 at 14:58 in reply to: Russia begins interference in US 2020 election, backs Sanders #6619
Sting Rays, interesting name! Can someone tell me more about them?
We have yet to see how capable the Iranians are at cyber warfare. Indeed they have been engaged in a long series of cyber skirmishes with the US navy (particularly in the Arabian Gulf), however none of those skirmishes demonstrate Iranian superiority as far as cyber warfare is concerned. It is highly possible that the Iranians may seek to target neighbouring states, and/or American interests in the GCC, over attempting to paralyse an arm of the US government. The Iranian missile response to Suleimani’s assassination in Iraq, which resulted in no loss of American life, demonstrates how far Iran is prepared to go at the moment. Proportional ? Or face saving? Definitely not an eye for an eye.
This makes us really think about everything we share in our phones, Are we safe from this kind of attacks. I am an Iphone user, it makes me ask myself am I safe to share my information since Iphone users are not safe? anything work related or even health can be used in a way for them. yes we can protect our self but if the iphone servers got hacked that’s it for your personal data.
Good article Timothy. This is an eye opener to a lot of things, the war is no longer with machines. Its mixed with with the electronics now days where you have to think about your cyber security safety. its not easy to hack this kind of things. But with the wrong hands, like people who didn’t bother to learn how to use it safely or traitors that can easily just give them an easy access.
May 13, 2019 at 15:25 in reply to: MitM Attacks: How They Work and How to Prevent Them #3083
- This reply was modified 1 year, 1 month ago by OmarAltamimi.
Its always good to be extra safe when it comes to internet. MitM is not a new thing but it became a huge thing now days.
Sometimes People login into a random Wi-Fi hotspots without really thinking much about it or clicking on links from emails they don’t know and some people don’t understand the danger of it. We have to think more than twice about it, this kind of attacks can make you lose your money, what’s worse is people losing their trust on you.
getting your info leaked or used by a stranger, spying on your daily life, and knowing all the information about your life style and maybe your secrets and that can be used against you.April 15, 2019 at 12:03 in reply to: Types of Social Engineering Attacks and How to Protect Yourself #2742
We have to think about everything we have to do nowadays. One wrong move can ruin our life, by losing money or even giving them an access to our daily life which is worse than losing money. Some kids are being blackmailed because the wrong way of using the internet.
Always learn how to be safe.
- This reply was modified 1 year, 3 months ago by OmarAltamimi.
It’s a very delicate subject.
One sensitive leaked information will alter the course of elections or agreements with neighboring countries.
which is kind of Scary.