Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Privacy & Compliance

Mobiles, Internet cut in Syria’s Aleppo: NGO

BEIRUT – (AFP) – Mobile phone and Internet services have been cut in Aleppo, Syria’s second city, where a crucial battle is taking place between rebels and the army, the Syrian Observatory for Human Rights said on Thursday.

“Mobile telecommunications services and Internet have been cut off in the city of Aleppo since last night,” it said. An activist, who asked not to be identified, confirmed that the Internet, landlines and some mobile services were down in the northern city, Syria’s commercial hub.

BEIRUT – (AFP) – Mobile phone and Internet services have been cut in Aleppo, Syria’s second city, where a crucial battle is taking place between rebels and the army, the Syrian Observatory for Human Rights said on Thursday.

“Mobile telecommunications services and Internet have been cut off in the city of Aleppo since last night,” it said. An activist, who asked not to be identified, confirmed that the Internet, landlines and some mobile services were down in the northern city, Syria’s commercial hub.

“MTN is down while Syriatel is working. But Syriatel is working only for calls, not the 3G Internet service,” he said, referring to the only mobile providers in the country. “The landlines are also down.”

A Syrian security source in Damascus told AFP that such cuts are “generally the precursor to a major military offensive.”

The rebel Free Syrian Army has said it controls “50 percent” of Aleppo, where the army is bombarding rebel-held areas but has yet to advance on the ground.

The conflict in Aleppo has raged since July 20, with both sides sending in reinforcements for what the security source has predicted will be a protracted battle.

Related: Trojan Targeting Syrian Activists Spreading via Skype

RelatedAnti-Censorship Tool Used in Syria and Iran Compromised

Advertisement. Scroll to continue reading.
Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

Privacy

Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...

Mobile & Wireless

As smartphone manufacturers are improving the ear speakers in their devices, it can become easier for malicious actors to leverage a particular side-channel for...

Cloud Security

AWS has announced that server-side encryption (SSE-S3) is now enabled by default for all Simple Storage Service (S3) buckets.

Audits

The PCI Security Standards Council (SSC), the organization that oversees the Payment Card Industry Data Security Standard (PCI DSS), this week announced the release...

Application Security

Security researchers at Google’s Project Zero have picked apart one of the most notorious in-the-wild iPhone exploits and found a never-before-seen hacking roadmap that...