Coverage edition of fox news at night the reporting you see, the map on your screen there, the reporting has been fox news has not confirmed these strengths but the reporting has been there have been explosions in syria. Explosions or explosions heard in iraq and explosions in southern iran, about 200 miles south of tehran p. Or can a place. In this area there are Nuclear Facilities. We do not know if those Nuclear Facilities were targeted up your act they just happened to be in the vicinity and so right now we are waiting for clarification from the Israeli Government and clarification from iran. We know that there were. But we do not know the specifics of what happened, of how many strikes there where p. Or we dont know if these came from the air, if they came from drones, we dont know where these strikes came from but we do believe that they came from israel. Nobody has knocked down any of that reporting as of yet we should point out that they are now reporting an israeli strike with
unmanned aircraft or what have you, it seems as if it was somewhat of a tit-for-tat. if i did want to escalate i would go after the nuclear facilities. that would be a boot on the throat of iran considering the fact i think israel would probably their largest threat is iran s nuclear capability. granted, hearing some of the folks that have been speaking recently, it doesn t seem that is what happened. israel could have done some more software attacks whether it be on military installations, military depots, thanks of that nature to give around the warning to say we will route we will retaliate if you attack us. i think there is something to be said here when i just talked about how this timeline of events has gone on where it s gone a little bit more aggression here and there. i think we have to take a look at the fact that this is what
it. criminals are hilo successful with it and they will do it more than they already are. it is in the point of service and lives on the place where you swipe your card. i have swept my credit card three types today. it is only lunch time. it is barely lunch time. that s right. how does this work, melissa, what is your understanding? there is a teeny sliver of time before your information is encrypted and that s when the software attacks and the crim names say they buy it on the black market. you can update it remotely and modify. it it is hard to detect and has been a round for a long time. and used more than ever. it sounds insiddious, too. and all of the retail iters are involved and you only use your credit card more and more often and debit cards these days. what are they telling the retailers on how to protect the