The network continues to rage around Kanye West, and this time Israelis are "hijacking":
following the rapper's anti-immigration tweets, the Hollywood stars stood on their hind legs and announced Kabal with and Instagram: "I support my fellow Jews and the Jewish people."
In addition, various Israelis uploaded stories with the hashtag fuckkanye#, where in some stories they show how they cut off the shoes designed by the rapper, YEEZY BOOST, as an act of protest.
The image of the cut shoes that was uploaded to the story, photo: None
The Israeli protest against Kanye West, photo: none
But the response was not long in coming, and anti-Israel hackers broke into those Instagram accounts and disabled them.
This, for example, happened to Shimon of Herzliya, who posted a story in which he shows how he defaced the shoes identified with Kanye.
A few hours after he uploaded the story, hackers broke into his account, disabled it and uploaded posts and stories promoting Bitcoin trading.
A story uploaded by the hackers who broke into Instagram, photo: none
The story that the hackers uploaded from the hacked account, photo: from Instagram
If your Instagram account has also been hacked, you must report it to the company at this link: click here.
Did you fall into the trap?
20% clicked on the link of the IDF's "phishing" exercise
On the occasion of World Cyber Defense Awareness Month, which is observed every year in October, today the National Cyber Unit and the ICT and Information Security Division of the IDF conducted an extensive phishing exercise aimed at raising awareness of cyber threats. As part of the exercise, more than 300,000 regular and permanent soldiers, IDF employees and reservists received , text messages with messages that promise some benefit and lead to a link that looks unofficial.
Whoever clicked on the link received a message that this was an exercise and recommendations for identifying these types of messages.
The phishing message as part of the exercise, photo: None
The data shows that in the first hour of the exercise, about 11% of the recipients of the messages clicked on the link.
As of 12:30, the percentage of clicks on the link was about 20% of all recipients of the messages.
In the previous exercise held last May among regular soldiers, reservists and civilian employees of the IDF only (irregularly), the percentage of clicks was 30% of the recipients of the messages. Some of the recipients of the messages showed vigilance and reported to the 119 hotline of the cyber system.
How will you spot a phishing attempt?
• A message containing incorrect wording.
• Lack of personal contact.
• Creating pressure and a sense of urgency.
• A message that contains an exaggerated promise or a large reward.
• Sending from an unknown number or name.
• Referral to click on a shortened link or one that is different from an official website address.
were we wrong
We will fix it!
If you found an error in the article, we would appreciate it if you shared it with us