• Xatolos@reddthat.com
    link
    fedilink
    English
    arrow-up
    3
    ·
    19 hours ago

    Your comment is embarrassing you.

    Read the actual article, not the second hand one linked:

    Military intelligence has also exposed repeated “honeypot” schemes in which operatives posed as women online to lure personnel into installing malware, most notably in Operation HeartBreaker. Analysts noted that such campaigns sought access to contacts, photos, and real-time location data on soldiers’ devices.
    The new step follows earlier efforts to harden mobile use across the force, including training and internal drills designed to raise officers’ awareness of social-engineering tactics. In recent years, the IDF even staged scenarios mimicking Hezbollah-linked “honeypots” to stress-test units’ digital discipline.

    It’s not due to security, it’s due to social engineering. The user will always be the weakest link.

    The real article is linked in this second hand one. https://archive.is/Y7iCJ>>

    • favoredponcho@lemmy.zip
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      2
      ·
      edit-2
      18 hours ago

      I’m not sure what point you’re trying to make. The article you link still shows Israel’s military requiring soldiers to use iPhones and not Android devices for security purposes. Just because a hack is achieved through socially engineered user action doesn’t mean OS security can’t mitigate or aggravate an intrusion. It seems Israel is acknowledging that by setting this new requirement and assessing that iPhones are more resistant to getting malware installed on them by an unsuspecting user.

      • Xatolos@reddthat.com
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        19 hours ago

        Ah yes, the old “reading is hard so I ignore the facts”. A classic.

        Maybe you could ask Apple Intelligence to explain it to you, and what’s the difference between computer security and social engineering.

        • favoredponcho@lemmy.zip
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          18 hours ago

          Here is something for you to read from the article you posted:

          The Israel Defense Forces will tighten rules on mobile devices for senior officers and prohibit Android phones on IDF-issued lines, Army Radio reported on Wednesday.

          Under the expected order, commanders from the rank of lieutenant colonel and above will be permitted to use only Apple iPhones for official communications. The step is aimed at reducing the risk of intrusions on senior officers’ handsets, according to the report

          • Xatolos@reddthat.com
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            1
            ·
            18 hours ago

            Good, good. You’re learning basic reading. Now continue read the rest of it.

            Also, since you have no understanding of cyber security, here is Chatgpt to help explain the difference between it and social engineering. I even got it to explain it to a child’s level so it won’t have any scary big words to frighten you:

            • Cybersecurity is like locking the doors and windows of your house so strangers can’t sneak in and take your toys or mess with your stuff. It uses tools like passwords, codes, and special locks on computers to keep everything safe.

            • Social engineering is when a trickster doesn’t try to break the lock but instead pretends to be your friend or someone you trust, so you open the door for them. For example, they might say, “I’m your teacher, give me your homework password,” even though they’re not really your teacher.

            The difference: Cybersecurity is about building strong locks, while social engineering is about tricking people into opening the door themselves.

            • favoredponcho@lemmy.zip
              link
              fedilink
              English
              arrow-up
              1
              arrow-down
              1
              ·
              edit-2
              18 hours ago

              I have a degree in cybersecurity and my day job is in cybersecurity. You’re not actually making a point that makes any sense to the original argument. Also, you missed the point I made. You also seem to not really be capable of connecting the dots made by the article that you linked. It’s the same point.

              Here is a question for you: if the issue is members of the IDF are falling for honeypots and social engineering and being tricked into installing malware, why then is the IDF restricting its members to using Apple iPhones?

              Hint: the answer is in your article.

              • Xatolos@reddthat.com
                link
                fedilink
                English
                arrow-up
                2
                arrow-down
                1
                ·
                18 hours ago

                If you’re in cyber security, then I pity your employer. You openly admitted you don’t know the main difference between cyber security and social engineering, this is the very basics of security.

                Two, you need to learn to read the whole article, again, basics of cyber security. If you can’t read an entire article this basic, then how is anyone supposed to expect you to understand how to read a CVE report?

                “The new step follows earlier efforts to harden mobile use across the force, including training and internal drills designed to raise officers’ awareness of social-engineering tactics. In recent years, the IDF even staged scenarios mimicking Hezbollah-linked “honeypots” to stress-test units’ digital discipline.”

                You read the first two paragraphs, which aligned with your confirmation bias, and ignored the further details that explained that it’s due to the push against social engineering, which doesn’t help your confirmation bias.

                • favoredponcho@lemmy.zip
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  arrow-down
                  1
                  ·
                  17 hours ago

                  Despite your verbose post, filled with ad hominem attacks and misdirection, you didn’t answer the question. Why did IDF switch to Apple iPhones and ban Android?