Fake News Prompts International Concern

The 2020 US presidential election campaign has started now that a number of Democrats say they’re looking for their party’s presidential nomination.  Disappointingly, already there’s evidence of disinformation campaigns on social media. That’s according to the site Politico.com, which asked a tech company to do an analysis of recent Twitter messages about candidates. 

One of the false messages alleges that a blackface doll appeared on a kitchen cabinet in the background of a senator’s New Year’s Eve Instagram livestream. Some of the negative messages appear to be from automated accounts. No one knows yet who’s behind them.

Governments are becoming increasingly worried about the effect on democracy of disinformation, which is why politicians from nine countries, including Canada, France and the UK, have formed what they call an international grand committee into the problem. 

On Wednesday 20th February they invited the heads of 10 tech companies, including Facebook CEO Mark Zuckerberg, Google CEO Sundar Pichai, Twitter CEO Jack Dorsey and Apple CEO Tim Cook to Ottawa on May 28 for a meeting.

How many will show up is a question. Some may send lower executives, fearing the hearing may turn into an inquisition. When the committee held its first hearing in November in London, Zuckerberg sent a senior vice-president instead.

Users of the Windows file compression utility WinRAR are being warned to update to the latest version because of a serious bug. It could allow a hacker to take control of your computer. WinRAR helps shrink huge files for things like archiving or uploading. However, security company Check Point Software has discovered a flaw dates back to 2005 and has been in the software ever since. According to WinRAR’s website, 500,000 people around the world use the software. Updating to the latest version will ensure the bug can’t be exploited.

Speaking of updates, those of you who run either the Drupal or WordPress content management systems should think seriously of updating your websites. The latest versions patch critical flaws.

Finally, here’s some misinformation going around Facebook: When you go to a gas station use the Bluetooth detector on your smart phone to detect if the pump has a phony Bluetooth wireless credit card skimmer for stealing your card data. If it detects a device with a bunch of random numbers and letters, it must be phony. Not true, says security vendor Sophos. 

First, a device named with a bunch of numbers and letters isn’t necessarily crooked. It could be the video game being used by a kid in the next car. 

Second, criminals are unlikely to use a Bluetooth transmitter because of its short range. You’re wasting your time trying to detect criminality with Bluetooth. It’s better to just look at the card reader, in any business, and see if it looks like it’s been tampered with. If you’re really worried, pay with cash.

IT World Canada:

You Might Also Read: 

Zuckerberg Has Failed:

 

 

 

« Falling Returns Mean Cyberecriminals Are Turning To Unconventional Methods
Police Lure Youngsters Into Cyber Crime »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

MD5

MD5

MD5 is a leading UK provider of Digital Forensic & eDiscovery services to large multi-national corporate businesses, Law Enforcement & Government Agencies, high profile legal firms.

Falanx Cyber

Falanx Cyber

Falanx Cyber provides enterprise-class cyber security services and solutions. We deliver end-to-end cyber capabilities, either as specific engagements or as fully-managed services.

Subex

Subex

Subex leverages its award-winning telecom analytics solutions in areas such as Revenue Assurance, Fraud Management, Asset Assurance and Partner Management, and IoT Security.

H3C Group

H3C Group

H3C provides a full range of Computer, Storage, Networking and Security solutions.

ECOS Technology

ECOS Technology

ECOS Technology specializes in the development and sale of IT solutions for high-security remote access as well as the management of certificates and smart cards.

A-LIGN

A-LIGN

A-LIGN is a technology-enabled security and compliance partner trusted by more than 2,500 global organizations to mitigate cybersecurity risks.

Penacity

Penacity

Penacity, LLC provides strategic consulting technology services and Information Security Services to commercial and government organizations.

AFNOR Group

AFNOR Group

AFNOR Group designs and deploys solutions based on voluntary standards around the world and provides services including training, professional and technical information, assessment and certification.

TechBeacon

TechBeacon

TechBeacon.com is a digital hub by and for software engineering, IT and security professionals sharing practical and passionate guidance to real-world challenges.

VLATACOM Institute

VLATACOM Institute

Vlatacom Institute is privately owned accredited research and development institute, system integrator and turn-key solution provider. Areas of expertise include encryption and authentication.

IN4 Group

IN4 Group

IN4 Group is a skills, innovation and start-up services provider that specialises in supporting businesses with the training, communities, networks and advice they need to scale.

DataSixth Security Consulting

DataSixth Security Consulting

DataSixth delivers Cybersecurity Intelligence. With our unique capabilities, we’re able to deliver value, deliver answers, and deliver actionable security intelligence.

PA Consulting

PA Consulting

PA Consulting Group is a consultancy that specialises in strategy, technology and innovation. Our cyber security experts work with you to spot digital and technology security risks and reduce them.

Atlantic Data Security

Atlantic Data Security

Atlantic Data Security is skilled in the analysis, recommendation, deployment, and management of all critical components of the security infrastructure.

NetDescribe

NetDescribe

NetDescribe, part of Xantaro Group, advises and supports companies in building secure and stable IT environments.

Inveo Group

Inveo Group

Inveo group is the Italian leader for the management of privacy and data protection issues.