~Walter Bagehot, “William Cowper”
Internet trolls have a manifesto of sorts, which states they are doing it for the “lulz,” or laughs. What trolls do for the lulz ranges from clever pranks to harassment to violent threats. There’s also doxxing–publishing personal data, such as Social Security numbers and bank accounts–and swatting, calling in an emergency to a victim’s house so the SWAT team busts in. When victims do not experience lulz, trolls tell them they have no sense of humor. Trolls are turning social media and comment boards into a giant locker room in a teen movie, with towel-snapping racial epithets and misogyny. How Trolls Are Ruining the Internet
What makes a McMansion bad architecture?
One of the CIA’s top security officials said the cloud infrastructure built by Amazon Web Services is improving the spy agency’s cybersecurity posture and speed to mission handling national security threats. “Cloud has been a godsend for folks trying to implement systems quickly and for us to secure workloads better,” said CIA Chief Information Security Officer Sherrill Nicely, speaking Thursday at an event hosted by Nextgov. “We’re very happy with it,” Nicely added. “Our agency and other [intelligence community] components are busily working to move their workloads into the cloud, and off legacy and into the new.”
U.S. intelligence officials are planning to provide information including classified threat reports to companies about the risks of hacking and other crimes tied to the supplies and services they buy.
Las Vegas plays host to three of the most prominent forums in the hacker and information security communities: DEF CON, Black Hat and BSides. Those community-driven conferences offer daily presentations, hands-on training sessions, contests and the chance to exchange innovative ideas with leading information security thinkers. But as the government's need for skilled IT specialists continues to grow, events that draw thousands of hacking enthusiasts have become something of a nontraditional recruiting ground for federal employers.
“Chinese tourist who lost wallet in Germany ends up in refugee shelter — Man diverted to home in Dülmen after mistakenly filling in asylum application instead of stolen goods report.” He was there for two weeks — “He was then taken 220 miles (360km) to a refugee shelter…and given food and spending money like other refugees. “He simply did what he was told,” Schlütermann said.”
24/7 Wall St. reviewed the underemployment rate in every state. Nevada is the hardest state in which to find full-time work, with an underemployment rate of 13.1%. South Dakota is arguably the best state for job seekers, with an underemployment rate of 5.0%.”
One day, your thermostat will get hacked by some cybercriminal hundreds of miles away who will lock it with malware and demand a ransom to get it back to normal, leaving you literally in the cold until you pay up a few hundred dollars. This has been a scenario that security experts have touted as one of the theoretical dangers of the rise of the Internet of Things, internet-connected devices that are often insecure.
(1) Africa Check gets a lengthy profile on Spain's El Pais. (2) That totally inappropriate Supergirl poster was totally fake. (3) Is "post-fact" a "smear on the masses"? Maybe. (4) How not to start a fact check. (5) Read what readers are saying after PolitiFact changed its rating on a statement about evolution. (6) Turkish fact-checkers Dogruluk Payi are now publishing some content in English
France says fight against messaging encryption needs worldwide initiative
Why so many lottery jackpots this year?