The IS weapons are (foreign) websites and social networks. Objective: to feed the chaos with fake news and rumors to take breath from the enemy pressure.
It’s the result of a raid in the fourth phase of the Heroes of Iraq operation in Diyala framework, just begun and in which also the Kurds are participating. Meanwhile, Daesh tries not to lose space online.
Bleeping Computer: The app has been released by the Ministry of Health for both Android and iOS. It alerts users if they have been at a location at the same time as a known COVID-19 patient.
Cyber Security Experts: Hoaxes spread as a joke or to scam users with malware and phishing. Attention, trust only official sources and do not share content if you’re not sure.
ZDNet: Local ISPs have been instructed to force their respective users into installing a government-issued certificate on all devices. Formally to improve te cyber security.
Jigsaw will defend EU political organizations, campaigns, and candidates against DDoS and cyber attacks with Project Shield, training and tools, as Perspective.
Intelligence and Pentagon agreed on the outlines of offensive cyber warfare operations if the country interfere with the vote. It under the Trump NSPM 13.
The Cyber Command is s targeting Russian operatives to deter them from spreading disinformation, after the DOJ denounced an ongoing info-warfare campaign.