Cybersecurity

WhatsApp bug; the two-step verification system challenged

It seems that the two-factor authentications system is not a reliable method that will prevent hackers to sweep into users’ conversations. Recently, Roland Abi Najem, Cybersecurity and Digital Transformation Consultant, found a bug in the WhatsApp two-step verification code system. On July 18, 2020, someone attempted to hack Abi Najem’s WhatsApp account. On July 21, […]

Skybox Security: Vulnerability and Threat Trends Report

Skybox Security’s publishes mid-year update to its 2020 Vulnerability and Threat Trends Report predicting 2020 will break a new vulnerability record. (July 21, 2020) — Skybox® Security, a global leader in cybersecurity management, today published the mid-year update to its 2020 Vulnerability and Threat Trends Report. The report analyzes the vulnerabilities, exploits and threats in play over the […]

France will not ban Huawei despite US cybersecurity concerns

The US has managed to persuade the UK, Canada, and other countries to ban Huawei from the deployment of the 5G network. However, France announced that it would not have a complete ban on the Chinese telecom giant. Guillaume Poupard, head of the French cybersecurity agency (ANSSI) said during an interview with Les Echos newspaper, […]

Australia invests more in cybersecurity solutions

Australians are becoming more and more connected online and the cybersecurity threats are growing dramatically. Cryptomining, Data spill, Denial of service, hacking, identity theft, malware, phishing-scam emails, ransomware, scams, and web shell malware were identified as common online security risks by the Australian Cybersecurity Center ASCS. In May 2020, Scam Watch-a website run by the […]

Tunisian government efforts to contain Covid-19 raises privacy concerns

Governments are relying on data-driven technology to help contain the Covid-19 spread. The Tunisian government has been using SIM cards for tracking purposes. Cell site location information is one of the various methods used to trace individuals. Smartphones send signals to cell towers operated by telecommunications operators. This process generates information about a citizen’s precise […]

Legislation might be the only tool to stop phone scams

Every person is a victim of a phone scam, even William Webster, the former head of the Federal Bureau of Investigation (FBI). Service providers can sell your phone number for scammers to commit unlawful acts for hundreds of dollars. In fact, the call operations can do a Google search to find brokers who sell phone […]

Lawful tools make end-to-end encryption an irony

The end-to-end encryption feature is the most interesting tool that users search for when they download a messaging app. However, some government entities have been trying to ban it. On the other hand, authorities have passed legislation to read citizen’s messages legally. On November 29, 2016, the United Kingdom passed the Investigatory Powers Act (Known […]

Cyberattacks disrupting corporate systems no matter the size

What is a cyberattack? It is usually an assault or offensive maneuver launched by cybercriminals using one or more computers against single or multiple computers or networks. Its effects are harmful, going from maliciously disabling computers, stealing data, or using a breached computer as a launch point for other attacks and even damaging corporate or […]

DDos: an unlawful tool used to silence activists

Participating in a protest and sharing your views on the Internet are considered a human right. Based on domestic law, authorities shut down the internet in order to silence protestors. However, in late May 2020, cyber-attacks were used to silence activists especially those working in anti-racism organizations. Since George Floyd’s death, anti-racists groups and government […]