Concerns over digital security are reaching a critical point,as a leading security intelligence expert warns that nearly all internet-connected devices are susceptible to hacking [[1]]. This assessment arrives as global cybersecurity incidents continue to rise, with Check Point reporting over 4.4 million attacks on January 27th alone [[3]]. Dr. mohannad Salloum’s analysis reveals not only the capability of state-sponsored actors, but also the increasingly sophisticated and accessible methods used to compromise devices, presenting a growing challenge to individuals and governments alike [[2]].
Most internet-connected devices are vulnerable to hacking, according to a security expert. The assessment comes amid increasing global concerns about cybersecurity and data privacy.
Intelligence agencies, including the U.S. intelligence community, possess the capability to compromise virtually any device connected to the internet, stated Dr. Mohannad Salloum, a security intelligence expert. He pointed to past instances of surveillance, such as the reported monitoring of former German Chancellor Angela Merkel’s phone, as evidence of these capabilities – a situation that, despite being publicly acknowledged, did not elicit a strong response from German or Danish authorities.
Reports have also surfaced regarding Danish cooperation in intelligence gathering through undersea cables.
“The majority of intelligence agencies with sufficient technical capacity can penetrate any networked device,” Salloum explained. He cautioned against claims of absolute digital security, stating, “Any assertion that a device is secure and immune to compromise while connected to a network likely stems from a lack of technical understanding.”
Salloum noted that the primary challenge isn’t breaching a single device, but rather managing and exploiting a large number of compromised systems simultaneously. This makes mass hacking events particularly difficult to defend against.
He also highlighted the emergence of advanced hacking techniques, such as “zero-click intrusions,” which allow attackers to gain access to a phone without requiring any action from the user. “There are modern hacking techniques, through what is known as ‘zero-click intrusion,’ where a phone can be easily hacked without the user doing anything,” Salloum said. The development underscores the evolving sophistication of cyber threats and the increasing difficulty of maintaining digital security.