Entries by Tal Pavel, Ph.D

Ransomware named Tyrant attacking computers in Iran

On October 23, 2017, the Iranian CERT published a warning against a ransomware called Tyrant attacking Iranian computers running Microsoft Windows.   According to the announcement, the malware was hidden as Psiphon, a VPN software which is very popular in Iran. After opening it, users were presented with a Persian-language message that their computer had […]

Minister for AI appointed in the UAE

On October 19, 2017, a new cabinet was appointed in the United Arab Emirates, numbering 31 ministers. This was announced on the Twitter account of the Vice President, Prime Minister and Ruler of Dubai, His Highness Sheikh Mohammed bin Rashid Al Maktoum. It was also announced (in English and Arabic) that the 27-year-old Omar Bin […]

Four social media pages closed in Egypt for inciting violence

On October 10, 2017, it was published that Egyptian Interior Ministry had ordered to close four pages on social media (whose details were not disclosed) since these pages were administered by individuals who had used them to circulate posts inciting violence against state institutions and citizens The Egyptian parliament is scheduled to discuss a cyber […]

National Cyber Security CTF Competitions in Oman and Morocco

According to a report from October 2, 2017, Oman’s National Cyber Security CTF (Capture the Flag) Competition has been launched. The competition is held by the Information Systems Department at Sultan Qaboos University (SQU). The orientation sessions were held in various colleges and universities in Oman on September 25-28, 2017. The online event will take […]

Miss Turkey 2017 stripped of her crown due to a tweet which seems to support last year’s coup attempt

On September 22, 2017, Turkish and international media reported that the winner of Miss Turkey 2017, Itir Esen, was stripped of her crown just a few hours after winning the beauty pageant, due to a tweet she posted around the anniversary of the July 15, 2016 coup attempt, in which she sympathized with the martyrs. […]

Qatar’s telecommunication company Ooredoo’s activities

In late June 2016, Qatar’s telecommunication company Ooredoo announced the signing of two agreements. The first was signed with the Qatar Chamber, for cooperation to better represent Qatar’s business community and support its national Vision 2030. As part of this agreement, the company will provide telecommunications services and innovative apps to support the Chamber activities […]

Cyber spy attack targeting India and Pakistan

On August 28, 2017, it was published that a report sent by cyber security company Symantec Corp. to its clients in July reveals that it identified an ongoing cyber espionage campaign since October 2016, most probably a state-sponsored one – although the name of the country was not disclosed– against several entities in India and […]

Physical threats in Online Worlds – Technology, Internet and Cyber under Terror Organization Services; a Test Case of “The Islamic State”

Terror and internet, on the surface those are two different worlds of content: Terror is the implication of violence, or threatening to implement it, against civilians in the name of achieving political aims. First and foremost, granted the civilians are considered the “underbelly” of society and means of heightened pressure on the government so they […]

INTERPOL denies blocking Turkey from access to organizational database

On July 5, it was published that an Interpol spokesperson has denied reports appearing on the Turkish Internet that the organization has blocked Turkish access to the organizational database due to the revolutionary attempts in Turkey in the second half of July, 2016, when the authorities tried to upload a wanted list containing 50,000 movement […]

Google service to find the direction of prayer towards Mecca

According to a report from June 12, 2017, Google launched an application called Qibla Finder, intended to help people find the direction of prayer in Islam towards the city of Mecca, based on Augmented Reality. After the users give permission to the application to trace their location, it can direct them by displaying a blue […]