Mata Hari 2.0

It is hard to defeat technical system security. However, it is easy to trick system operators into compromising system security. People are the weakest link in cybersecurity. Realizing that even rebel fighters need love, cyberwarriors supporting the Syrian regime used the oldest trick in the book — feminine allure — for cyberespionage.

Mata Hari 2.0

Mata Hari 2.0

 

In a modern update of Mata Hari, Syrian cyberwarriors created a fake online persona and used it to trick a rebel fighter into compromising his system.

Learn more at our new blog.

Advertisements

Comments are closed.