Cybercriminals aren’t just lurking in the shadows—they’re zooming in on your photos. Ashraf Koheil, a cybersecurity expert from Meta, Group-IB, warns that posting two clear, high-resolution images could give scammers enough detail to steal your fingerprints. With that, they can craft fake digital identities, open bank accounts, generate e-SIMs, or even set up cryptocurrency wallets for shady activities like money laundering. Students from wealthy families are especially juicy targets for cyber risks, he notes.
But it’s not just about fingerprints. Andreas Hassellöf, CEO of Ombori, points out that while deepfakes and facial recognition sound scary, the real trouble comes from sharing everyday details—like your phone number or email. These bits of info are goldmines for crooks planning phishing scams, SIM swaps, or MITM attacks, where they intercept your communications to spy or impersonate you.
When the Cyberattacks Will be Spike?
Do you know, cyberattacks spike on Friday nights in the UAE. Why? Koheil explains that hackers exploit weekends when security teams are off-duty or stretched thin. They often strike during high-traffic events, like a telecom’s back-to-school promo, flooding systems with phishing messages. They also use geofencing tricks—tailoring scams based on your location (think Salik in the UAE or a local provider in Saudi Arabia)—making it tougher for tech defenses to spot them. Normally, security firms can squash an attack in an hour, but on Fridays, it might take four. “They study us just as much as we study them,” Koheil says.
SIM Swaps and MITM: What Are They?
Imagine this: a criminal convinces your phone carrier to link your number to their SIM card. That’s a SIM swap—and suddenly, they’ve hijacked your calls, texts, and two-factor authentication codes. Or picture an MITM attack, where a hacker slips between you and a website, eavesdropping or pretending to be you. These aren’t sci-fi plots; they’re real risks that can drain your bank account or expose your secrets.
How to Find Fight Against Cyber Risks?
Don’t panic—there are simple steps to shield yourself from these digital predators. Here’s your guide:
- Blur the Details: Avoid posting high-resolution photos that show fingerprints or personal info (like your ID or home address). Use editing tools to lower the quality before sharing—or better yet, keep those pics offline.
- Lock Down Your Data: Never share sensitive details like your phone number, email, or date of birth publicly. Cybercriminals can piece these together like a puzzle to unlock your life.
- Enable Multi-Factor Authentication (MFA): Add an extra lock to your accounts with MFA. Even if a hacker grabs your password, they’ll need a second key—like a code sent to your phone or email—to get in.
- Watch Out on Fridays: Be extra cautious with links or messages on Friday nights. If something feels off, don’t click—it could be a phishing trap.
- Tech to the Rescue: Hassellöf suggests using AI tools to spot fake images and blockchain tech for secure identity management. These aren’t just buzzwords—they’re shields against tomorrow’s threats.
Stay Smart, Stay Safe on Social Media
The UAE’s love for social media is a double-edged sword. It connects us, but it also exposes us. By tweaking your habits—like skipping the ultra-HD uploads and beefing up your account security—you can outsmart the crooks waiting to pounce. Cybersecurity isn’t just for experts; it’s for anyone who wants to enjoy the online world without becoming a target. So next time you’re about to post that perfect shot, just think twice!
For more breaking news and trending updates, stay tuned with The Dubai Street or follow us on @thedubaistreet