~Walter Bagehot, “William Cowper”
Internet trolls have a manifesto of sorts, which states they are doing it for the “lulz,” or laughs. What trolls do for the lulz ranges from clever pranks to harassment to violent threats. There’s also doxxing–publishing personal data, such as Social Security numbers and bank accounts–and swatting, calling in an emergency to a victim’s house so the SWAT team busts in. When victims do not experience lulz, trolls tell them they have no sense of humor. Trolls are turning social media and comment boards into a giant locker room in a teen movie, with towel-snapping racial epithets and misogyny. How Trolls Are Ruining the Internet
They’re
turning the web into a cesspool of aggression and violence. What
watching them is doing to the rest of us may be even worse Door Stoppers
Election fraud report calls for stringent ID checks The Guardian What makes a McMansion bad architecture?
Big
Banks Team Up to Fight Cyber Crime
Virtual reality and the theory of moral sentiments
62 year-old woman facing ruin after sending her life savings to a dating site conman has been convicted of money laundering after she unwittingly passed cash to the scammer from other victims Dating site scam victim convicted money laundering
Big banks
are revving up efforts to combat cybercriminals targeting the
financial-services industry. Eight of the largest U.S. banks are forming a
group that seeks to tackle the growing cyberthreat. It includes J.P. Morgan
Chase & Co., Bank of America Corp. and Goldman Sachs Group Inc., among
others. While still in its early stages, the big banks expect the group members
will share more information with each other about threats, prepare
comprehensive responses for when attacks occur and conduct war games designed
for the issues facing the biggest institutions.
The White
House cyber commission wants input on how to keep Americans safe in cyberspace.
The Commission on Enhancing National Cybersecurity today posted a request for information
in the Federal Register for broad input about cybersecurity in the digital
economy today and in the future. “Steps must be taken to enhance existing
efforts to increase the protection and resilience of the digital ecosystem,
while maintaining a cyber environment that encourages efficiency, innovation
and economic prosperity,” the RFI states. The commission, stood up by executive
order as part of the Cybersecurity National Action Plan, is tasked with
creating a road map to improve public- and private-sector cybersecurity over
the next 10 years while also protecting privacy and fostering innovation.
One of the CIA’s top security officials said the cloud infrastructure built by Amazon Web Services is improving the spy agency’s cybersecurity posture and speed to mission handling national security threats. “Cloud has been a godsend for folks trying to implement systems quickly and for us to secure workloads better,” said CIA Chief Information Security Officer Sherrill Nicely, speaking Thursday at an event hosted by Nextgov. “We’re very happy with it,” Nicely added. “Our agency and other [intelligence community] components are busily working to move their workloads into the cloud, and off legacy and into the new.”
U.S. intelligence officials are planning to provide information including classified threat reports to companies about the risks of hacking and other crimes tied to the supplies and services they buy.
Will Sex Robots Destroy the Human Race? Experts Host a Tech Conference to Discuss
Las Vegas plays host to three of the most prominent forums in the hacker and information security communities: DEF CON, Black Hat and BSides. Those community-driven conferences offer daily presentations, hands-on training sessions, contests and the chance to exchange innovative ideas with leading information security thinkers. But as the government's need for skilled IT specialists continues to grow, events that draw thousands of hacking enthusiasts have become something of a nontraditional recruiting ground for federal employers.
“Chinese tourist who lost wallet in Germany ends up in refugee shelter — Man diverted to home in Dülmen after mistakenly filling in asylum application instead of stolen goods report.” He was there for two weeks — “He was then taken 220 miles (360km) to a refugee shelter…and given food and spending money like other refugees. “He simply did what he was told,” Schlütermann said.”
Museum economics
24/7 Wall St. reviewed the underemployment rate in every state. Nevada is the hardest state in which to find full-time work, with an underemployment rate of 13.1%. South Dakota is arguably the best state for job seekers, with an underemployment rate of 5.0%.”
One day, your thermostat will get hacked by some cybercriminal hundreds of miles away who will lock it with malware and demand a ransom to get it back to normal, leaving you literally in the cold until you pay up a few hundred dollars. This has been a scenario that security experts have touted as one of the theoretical dangers of the rise of the Internet of Things, internet-connected devices that are often insecure.
(1) Africa Check gets a lengthy profile on Spain's El Pais. (2) That totally inappropriate Supergirl poster was totally fake. (3) Is "post-fact" a "smear on the masses"? Maybe. (4) How not to start a fact check. (5) Read what readers are saying after PolitiFact changed its rating on a statement about evolution. (6) Turkish fact-checkers Dogruluk Payi are now publishing some content in English
Late last
year, a group of hackers likely linked to the Iranian government reorganized
the infrastructure supporting their cyberattacks. The hackers built it so their
malware, which was infecting Iranian human rights activists and dissidents at
home and abroad, would contact different servers under their control
How
Researchers Exposed Iranian Cyberattacks Against Hundreds of Activists
Messaging
encryption, widely used by Islamist extremists to plan attacks, needs to be
fought at international level, French Interior Minister Bernard Cazeneuve said
on Thursday, and he wants Germany to help him promote a global initiative.
France says fight against messaging encryption needs worldwide initiative
France says fight against messaging encryption needs worldwide initiative
In the past
few months, hackers have taken over the social-media accounts of Facebook Inc.
Chief Executive Mark Zuckerberg, Google CEO Sundar Pichai and Twitter Inc. ’s
CEO, Jack Dorsey. Behind the scenes, security teams at every major technology
company—and many smaller firms, too—are scrambling to protect others from the
same fate. Some of the executives apparently reused passwords that had been
stolen in earlier hacks of LinkedIn, Myspace and other sites; others may have
fallen victim to software that uses the old passwords to guess new ones. Password
Hacking Forces Big Tech Companies to Act
Vulnerability
Exposes 900M Android Devices—and Fixing Them Won’t Be Easy
Why so many lottery jackpots this year?
Why so many lottery jackpots this year?