Fake News Prompts International Concern

The 2020 US presidential election campaign has started now that a number of Democrats say they’re looking for their party’s presidential nomination.  Disappointingly, already there’s evidence of disinformation campaigns on social media. That’s according to the site Politico.com, which asked a tech company to do an analysis of recent Twitter messages about candidates. 

One of the false messages alleges that a blackface doll appeared on a kitchen cabinet in the background of a senator’s New Year’s Eve Instagram livestream. Some of the negative messages appear to be from automated accounts. No one knows yet who’s behind them.

Governments are becoming increasingly worried about the effect on democracy of disinformation, which is why politicians from nine countries, including Canada, France and the UK, have formed what they call an international grand committee into the problem. 

On Wednesday 20th February they invited the heads of 10 tech companies, including Facebook CEO Mark Zuckerberg, Google CEO Sundar Pichai, Twitter CEO Jack Dorsey and Apple CEO Tim Cook to Ottawa on May 28 for a meeting.

How many will show up is a question. Some may send lower executives, fearing the hearing may turn into an inquisition. When the committee held its first hearing in November in London, Zuckerberg sent a senior vice-president instead.

Users of the Windows file compression utility WinRAR are being warned to update to the latest version because of a serious bug. It could allow a hacker to take control of your computer. WinRAR helps shrink huge files for things like archiving or uploading. However, security company Check Point Software has discovered a flaw dates back to 2005 and has been in the software ever since. According to WinRAR’s website, 500,000 people around the world use the software. Updating to the latest version will ensure the bug can’t be exploited.

Speaking of updates, those of you who run either the Drupal or WordPress content management systems should think seriously of updating your websites. The latest versions patch critical flaws.

Finally, here’s some misinformation going around Facebook: When you go to a gas station use the Bluetooth detector on your smart phone to detect if the pump has a phony Bluetooth wireless credit card skimmer for stealing your card data. If it detects a device with a bunch of random numbers and letters, it must be phony. Not true, says security vendor Sophos. 

First, a device named with a bunch of numbers and letters isn’t necessarily crooked. It could be the video game being used by a kid in the next car. 

Second, criminals are unlikely to use a Bluetooth transmitter because of its short range. You’re wasting your time trying to detect criminality with Bluetooth. It’s better to just look at the card reader, in any business, and see if it looks like it’s been tampered with. If you’re really worried, pay with cash.

IT World Canada:

You Might Also Read: 

Zuckerberg Has Failed:

 

 

 

« Falling Returns Mean Cyberecriminals Are Turning To Unconventional Methods
Police Lure Youngsters Into Cyber Crime »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jones Day

Jones Day

Jones Day is an international law firm based in the United States. Practice areas include Cybersecurity, Privacy & Data Protection.

adaware

adaware

adaware is an award-winning security and privacy software provider, empowering users to connect with confidence.

IronNet Cybersecurity

IronNet Cybersecurity

IronNet’s product and services provide enterprise-wide security management and visibility of your network, users and assets.

Cryptshare

Cryptshare

Cryptshare is a communication solution that enables you to share e-mails and files of any size securely.

IoTsploit

IoTsploit

IoTsploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IoT vulnerabilities.

SYSGO

SYSGO

SYSGO is the leading European provider of real-time operating systems for critical embedded applications in the Internet of Things (IoT).

Cysiv

Cysiv

Cysiv SOC-as-a-Service combines all the elements of an advanced, proactive, threat hunting SOC, with a managed security stack for hybrid cloud, network, and endpoint security.

SightGain

SightGain

SightGain is the only integrated risk management solution focused on cybersecurity readiness using real-world attack simulations in your live environment.

KanREN

KanREN

KanREN is a member based consortium offering custom, world-class network services and support for researchers, educators, and public service institutions in the state of Kansas.

VCG Group

VCG Group

VCG provides everything you need for the design, implementation and management of data centres, cyber-secure enterprise networks, cloud and connectivity services.

Quantum Star Technologies

Quantum Star Technologies

Quantum Star Technologies has developed Starpoint to be a next-next-generation solution to cyber security threats. Our mission is to secure the online world through our patented technology.

Nextgen Group

Nextgen Group

Nextgen Group is a pioneering technology services group with innovative and unique services across enterprise software, cloud, data management, and cybersecurity solutions.

O'Reilly Media

O'Reilly Media

O’Reilly’s help professionals learn best practices and discover emerging trends that will shape the future of the tech industry.

SIEM Xpert

SIEM Xpert

SIEM Xpert is a leader in Cyber Security Trainings and services since 2015.

Ofcom

Ofcom

Ofcom is the UK's communications regulator. We regulate the TV, radio and video on demand sectors, fixed line telecoms, mobiles, postal services, plus the airwaves over which wireless devices operate.

Tenchi Security

Tenchi Security

Tenchi Security are specialized in Third-Party Cyber Risk Management (TPCRM) and aim to reduce information asymmetry when it comes to third and Nth-Party security and compliance risk management.