WhatsApp Rolls-Out Emojis and Sharing of Files Over 2GB
Following last month’s announcement, Meta’s WhatsApp is rolling-out emojis and the ability to share files within WhatsApp up to 2GB in size.
In this article, we look at how, in addition to the devastating missiles, rockets, bombs, tanks and other weapons, Ukraine has also been the subject of cyber-warfare and we look at how these and other war-related issues could be cause for concern across Europe.
At the time of writing this article, as Ukraine has come under attack from Russian forces from the sea, ground and air, with reports indicating that:
State-sponsored cyber-attacks are now also very much an ongoing threat faced by all countries but, specifically in the case of Ukraine, they are being used against them as a weapon of war. Part military strategy, first proposed by Frank Hoffman, and highlighted in a NATO review last year, ‘hybrid warfare’ is described as an “interplay or fusion of conventional as well as unconventional instruments of power and tools of subversion” which are “blended in a synchronised manner to exploit the vulnerabilities of an antagonist and achieve synergistic effects.” In short, it’s a combination of conventional and unconventional strategies, methods, and tactics which includes cyber-attacks. These cyber-attacks are now used to support the ‘hard power’ of military action by disrupting vital services like power and communications to create more fear and confusion.
Russia has been blamed for the use of cyber-attacks against states before, including Ukraine, especially during military conflicts. For example:
The hard power of military attacks against Ukraine are reported to have been accompanied in recent weeks by cyber attacks. For example:
Countries have their own cyber protection units, usually linked to intelligence services/agencies, and the military. In terms of Ukraine’s defence against cyber-attacks, help could come from:
While thoughts are of course with the people of Ukraine, there has been much speculation and some warnings which indicate how the war could spread. For example:
At the beginning of February, oil facilities in Germany, Belgium and the Netherlands being targeted by cyber-attacks, thought to be of Russian origin, were seen as a way of Russia exerting pressure on Germany and came at a time when Russia was threatening to close its oil pipelines. Also, at the end of January, UK businesses were warned by the National Cyber Security Centre (NCSC) to bolster their cyber defences in case Russia widened its attack scope to NATO countries and/or because of the spread of malware related to attacks on Ukraine. The NCSC has given advice about how to prepare here: https://www.ncsc.gov.uk/guidance/actions-to-take-when-the-cyber-threat-is-heightened
In addition to the terrible consequences of war for Ukraine’s citizens, there is uncertainty and fear about what happens next, and what could happen to escalate the conflict. Also, with more than one-third of Europe’s natural gas coming from Russia there are, of course, concerns about how the conflict could begin affecting other countries and there are bound to be big knock-on consequences for supply chains and other industries across the world. In terms of technology, there are clear risks of more Russian cyber-attacks being launched against NATO countries and the US and, as NCSC has warned, UK businesses now need to pay special attention to strengthening their cyber defences, not least to protect against malware attacks. Large UK companies and organisations involved with vital UK infrastructure could now face serious cyber-attacks (e.g. DDoS attacks) and, if not properly protected, this could have wider effects across the country for businesses and homes.
Following last month’s announcement, Meta’s WhatsApp is rolling-out emojis and the ability to share files within WhatsApp up to 2GB in size.
Apple, Google and Microsoft have announced that they are joining forces to support a common passwordless sign-in standard that will allow websites and apps to offer consistent, secure and easy sign-ins across devices and platforms.
In this article, we look at the legal issues around recording calls on your mobile, and the different methods for doing so.