It seems that the two-factor authentications system is not a reliable method that will prevent hackers to sweep into users’ conversations. Recently, Roland Abi Najem, Cybersecurity and Digital Transformation Consultant, found a bug in the WhatsApp two-step verification code system. On July 18, 2020, someone attempted to hack Abi Najem’s WhatsApp account. On July 21, […]
Cybersecurity
Skybox Security’s publishes mid-year update to its 2020 Vulnerability and Threat Trends Report predicting 2020 will break a new vulnerability record. (July 21, 2020) — Skybox® Security, a global leader in cybersecurity management, today published the mid-year update to its 2020 Vulnerability and Threat Trends Report. The report analyzes the vulnerabilities, exploits and threats in play over the […]
TikTok owned by the China-based ByteDance has not accepted to share data with Chinese authorities. However, On July 1, 2020, a new national security law took effect in China. Under this law, services providers have to remove any message that would constitute an offense endangering national security. If these companies fail to comply with the […]
The US has managed to persuade the UK, Canada, and other countries to ban Huawei from the deployment of the 5G network. However, France announced that it would not have a complete ban on the Chinese telecom giant. Guillaume Poupard, head of the French cybersecurity agency (ANSSI) said during an interview with Les Echos newspaper, […]
Australians are becoming more and more connected online and the cybersecurity threats are growing dramatically. Cryptomining, Data spill, Denial of service, hacking, identity theft, malware, phishing-scam emails, ransomware, scams, and web shell malware were identified as common online security risks by the Australian Cybersecurity Center ASCS. In May 2020, Scam Watch-a website run by the […]
Governments are relying on data-driven technology to help contain the Covid-19 spread. The Tunisian government has been using SIM cards for tracking purposes. Cell site location information is one of the various methods used to trace individuals. Smartphones send signals to cell towers operated by telecommunications operators. This process generates information about a citizen’s precise […]
Every person is a victim of a phone scam, even William Webster, the former head of the Federal Bureau of Investigation (FBI). Service providers can sell your phone number for scammers to commit unlawful acts for hundreds of dollars. In fact, the call operations can do a Google search to find brokers who sell phone […]
The end-to-end encryption feature is the most interesting tool that users search for when they download a messaging app. However, some government entities have been trying to ban it. On the other hand, authorities have passed legislation to read citizen’s messages legally. On November 29, 2016, the United Kingdom passed the Investigatory Powers Act (Known […]
What is a cyberattack? It is usually an assault or offensive maneuver launched by cybercriminals using one or more computers against single or multiple computers or networks. Its effects are harmful, going from maliciously disabling computers, stealing data, or using a breached computer as a launch point for other attacks and even damaging corporate or […]
Participating in a protest and sharing your views on the Internet are considered a human right. Based on domestic law, authorities shut down the internet in order to silence protestors. However, in late May 2020, cyber-attacks were used to silence activists especially those working in anti-racism organizations. Since George Floyd’s death, anti-racists groups and government […]