Except they don’t. Sure, if your comparing a $500 Windows laptop to a $2000 MacBook, then yes this is correct, but once you start comparing computers of the same price tag then it gets different. The parts on the Windows devices tend to be newer, faster, better screen/touch screen, and longer supported. Apple supports their computers for around 7 years before they can’t be updated, Windows on average 10 years. And yes, Windows computers do last 10+ years, everyone is complaining very loudly how their 10+ year old Win10 machine isnt getting updates anymore and cant install Win11.
- 10 Posts
- 9 Comments
Who said they knew the road well? It could be their first time there and the phones map told them a left turn was coming up.
Xatolos@reddthat.comto
Global News@lemmy.zip•Israel’s IDF Bans Android Phones—iPhones Now ‘Mandatory’English
21·22 days agoIf you’re in cyber security, then I pity your employer. You openly admitted you don’t know the main difference between cyber security and social engineering, this is the very basics of security.
Two, you need to learn to read the whole article, again, basics of cyber security. If you can’t read an entire article this basic, then how is anyone supposed to expect you to understand how to read a CVE report?
“The new step follows earlier efforts to harden mobile use across the force, including training and internal drills designed to raise officers’ awareness of social-engineering tactics. In recent years, the IDF even staged scenarios mimicking Hezbollah-linked “honeypots” to stress-test units’ digital discipline.”
You read the first two paragraphs, which aligned with your confirmation bias, and ignored the further details that explained that it’s due to the push against social engineering, which doesn’t help your confirmation bias.
Xatolos@reddthat.comto
Global News@lemmy.zip•Israel’s IDF Bans Android Phones—iPhones Now ‘Mandatory’English
21·22 days agoGood, good. You’re learning basic reading. Now continue read the rest of it.
Also, since you have no understanding of cyber security, here is Chatgpt to help explain the difference between it and social engineering. I even got it to explain it to a child’s level so it won’t have any scary big words to frighten you:
-
Cybersecurity is like locking the doors and windows of your house so strangers can’t sneak in and take your toys or mess with your stuff. It uses tools like passwords, codes, and special locks on computers to keep everything safe.
-
Social engineering is when a trickster doesn’t try to break the lock but instead pretends to be your friend or someone you trust, so you open the door for them. For example, they might say, “I’m your teacher, give me your homework password,” even though they’re not really your teacher.
The difference: Cybersecurity is about building strong locks, while social engineering is about tricking people into opening the door themselves.
-
Xatolos@reddthat.comto
Global News@lemmy.zip•Israel’s IDF Bans Android Phones—iPhones Now ‘Mandatory’English
21·22 days agoAh yes, the old “reading is hard so I ignore the facts”. A classic.
Maybe you could ask Apple Intelligence to explain it to you, and what’s the difference between computer security and social engineering.
Xatolos@reddthat.comto
Global News@lemmy.zip•Israel’s IDF Bans Android Phones—iPhones Now ‘Mandatory’English
32·22 days agoPot meet kettle. You two would make a great team.
Xatolos@reddthat.comto
Global News@lemmy.zip•Israel’s IDF Bans Android Phones—iPhones Now ‘Mandatory’English
31·22 days agoYour comment is embarrassing you.
Read the actual article, not the second hand one linked:
Military intelligence has also exposed repeated “honeypot” schemes in which operatives posed as women online to lure personnel into installing malware, most notably in Operation HeartBreaker. Analysts noted that such campaigns sought access to contacts, photos, and real-time location data on soldiers’ devices.
The new step follows earlier efforts to harden mobile use across the force, including training and internal drills designed to raise officers’ awareness of social-engineering tactics. In recent years, the IDF even staged scenarios mimicking Hezbollah-linked “honeypots” to stress-test units’ digital discipline.It’s not due to security, it’s due to social engineering. The user will always be the weakest link.
The real article is linked in this second hand one. https://archive.is/Y7iCJ>>
Me explaining what “Insert Disk 2 of 5” means.












“Turn right and then turn left” I’ve had this exact instruction before and would easily lead to this situation. In these types of moments, odds are you are looking and the road and not the screen so rely on the audio commands.