Haberler   
  English   
  Kurdî   
  En.Haberler.Com - Latest News
SEARCH IN NEWS:
  HOME PAGE 19/09/2024 11:12 
News  > 

How did a pager turn into a bomb? Here is the most powerful scenario regarding Israel's cyber attack.

How did a pager turn into a bomb? Here is the most powerful scenario regarding Israel's cyber attack.

18.09.2024 00:10

Speaking to Haberler.com about Israel's cyber attack in Lebanon, Prof. Dr. Ali Murat Kırık, a faculty member at Marmara University, said, "Explosives placed inside the device can be simultaneously detonated by remote signals. Small, inconspicuous electronic devices like communication devices are often seen as ordinary means of communication and can go unnoticed in security checks."

The world witnessed today for the first time a communication device turning into a bomb. It was announced that 9 people, including a child, lost their lives and approximately 2800 people were injured, 200 of them seriously, as a result of the explosions caused by the detonation of communication devices used by Hezbollah elements in Lebanon. The official Lebanese news agency NNA announced that "an unprecedented hostile security incident occurred in the southern suburbs of Beirut and many regions of Lebanon" due to Israel's infiltration into the "pager" communication devices.

How did a communication device turn into a bomb? Here is the most powerful scenario about Israel's cyber attack

Prof. Dr. Ali Murat Kırık, a faculty member at Marmara University, made striking statements about Israel's cyber attack in an interview with Haberler.com. Kırık emphasized that the simultaneous explosion of the communication devices of Hezbollah members in Lebanon revealed a new dimension of terrorist attacks and stated the following:

"CAN HAVE DISASTROUS CONSEQUENCES"

The explosion of communication devices may have been caused by their remote controllability. It is known that these types of devices can be triggered by digital signals. If the devices have security vulnerabilities in terms of software or hardware, hackers or enemy elements can cause them to explode by exploiting these weaknesses. The fact that civilians and a girl lost their lives in the incident shows how disastrous the consequences of such attacks can be.

How did a communication device turn into a bomb? Here is the most powerful scenario about Israel's cyber attack

"TERRORIST ORGANIZATIONS CAN MODIFY THESE DEVICES"

Explosives may have been placed inside the communication devices, which allows them to be remotely triggered and detonated. These types of devices can be modified in various ways, especially by terrorist organizations. For example, small explosive devices or detonation mechanisms can be added to the device. The explosives placed inside the device can be simultaneously detonated by remote signals. This method allows attackers to control their targets and cause large-scale damage at the same time. Small, inconspicuous electronic devices like communication devices can be preferred by terrorists because they are generally seen as ordinary communication tools and can go unnoticed in security checks. This allows attacks to be carried out in a more planned and effective manner.

How did a communication device turn into a bomb? Here is the most powerful scenario about Israel's cyber attack

"DOMESTIC SOFTWARE MAKES A DIFFERENCE FOR CIVILIAN TECHNOLOGIES AS WELL"

The development of domestic software by Turkish defense industry companies such as ASELSAN, HAVELSAN, and Baykar is of great importance in the face of such threats. The use of domestic software allows the creation of more resilient systems against external attacks by minimizing security vulnerabilities. This situation makes a big difference not only in the military field but also in civilian technologies. Foreign-dependent software can be manipulated by third parties or may contain malicious software components. It should not be forgotten that such risks always exist in smart devices. Even small and innocent-looking devices like communication devices can pose serious threats if security measures are not taken. Domestic software and strict security protocols are of critical importance in reducing these risks. Therefore, both individuals and states need to prioritize security in the use of technology.



 
Latest News
  • Striking detail in the delicate investigation! Was Enes Güran called for the murder case?
  • While the investigation into the murder of Narin Güran in Diyarbakır continues, the question of who and why killed Narin has not yet been clarified, but a new possible allegation has been added. The fact that Enes Güran, Narin's brother who works in Malatya, came to Tavşantepe a day before Narin disappeared raises the question of whether Enes was called for the murder.
  • 3 minutes ago...




  • The model who was under the influence of drugs while driving, fled the scene after killing two people with his vehicle.
  • Instagram influencer Maecee Lathers, had an accident in Florida that resulted in the death of two people. Lathers ran a red light and tried to flee the scene. Police found her vomiting and reported that she was speaking incoherently. Drug use was detected in her blood test. Lathers, who was driving with a suspended license, is being charged with serious crimes. The incident brought attention to the irresponsible behavior of social media celebrities and the dangers of drug use.
  • -35 minutes ago...

 
 
Top News