Fake News Prompts International Concern

The 2020 US presidential election campaign has started now that a number of Democrats say they’re looking for their party’s presidential nomination.  Disappointingly, already there’s evidence of disinformation campaigns on social media. That’s according to the site Politico.com, which asked a tech company to do an analysis of recent Twitter messages about candidates. 

One of the false messages alleges that a blackface doll appeared on a kitchen cabinet in the background of a senator’s New Year’s Eve Instagram livestream. Some of the negative messages appear to be from automated accounts. No one knows yet who’s behind them.

Governments are becoming increasingly worried about the effect on democracy of disinformation, which is why politicians from nine countries, including Canada, France and the UK, have formed what they call an international grand committee into the problem. 

On Wednesday 20th February they invited the heads of 10 tech companies, including Facebook CEO Mark Zuckerberg, Google CEO Sundar Pichai, Twitter CEO Jack Dorsey and Apple CEO Tim Cook to Ottawa on May 28 for a meeting.

How many will show up is a question. Some may send lower executives, fearing the hearing may turn into an inquisition. When the committee held its first hearing in November in London, Zuckerberg sent a senior vice-president instead.

Users of the Windows file compression utility WinRAR are being warned to update to the latest version because of a serious bug. It could allow a hacker to take control of your computer. WinRAR helps shrink huge files for things like archiving or uploading. However, security company Check Point Software has discovered a flaw dates back to 2005 and has been in the software ever since. According to WinRAR’s website, 500,000 people around the world use the software. Updating to the latest version will ensure the bug can’t be exploited.

Speaking of updates, those of you who run either the Drupal or WordPress content management systems should think seriously of updating your websites. The latest versions patch critical flaws.

Finally, here’s some misinformation going around Facebook: When you go to a gas station use the Bluetooth detector on your smart phone to detect if the pump has a phony Bluetooth wireless credit card skimmer for stealing your card data. If it detects a device with a bunch of random numbers and letters, it must be phony. Not true, says security vendor Sophos. 

First, a device named with a bunch of numbers and letters isn’t necessarily crooked. It could be the video game being used by a kid in the next car. 

Second, criminals are unlikely to use a Bluetooth transmitter because of its short range. You’re wasting your time trying to detect criminality with Bluetooth. It’s better to just look at the card reader, in any business, and see if it looks like it’s been tampered with. If you’re really worried, pay with cash.

IT World Canada:

You Might Also Read: 

Zuckerberg Has Failed:

 

 

 

« Falling Returns Mean Cyberecriminals Are Turning To Unconventional Methods
Police Lure Youngsters Into Cyber Crime »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation is Europe's leading centre for research & education in cybersecurity, cybercrime and digital forensics.

SAMATE

SAMATE

The Software Assurance Metrics And Tool Evaluation project is an inter-agency project between the US Department of Homeland Security and NIST.

Cyfor

Cyfor

Cyfor provides digital forensics and eDiscovery in civil, criminal, intellectual property, litigation and dispute resolution investigations.

Netresec

Netresec

Netresec is an independent software vendor with focus on the network security field. We specialize in software for network forensics and analysis of network traffic.

SIGA

SIGA

SIGA provides cyber security solutions for Industrial Control Systems SCADA systems used in critical infrastructures and industrial processes.

Wayra UK

Wayra UK

Wayra UK, part of Telefónica Open Future, has been chosen to run a new cyber accelerator facility to help UK start-ups grow and take the lead in producing the next generation of cyber security systems

DFI

DFI

DFI is a global leading provider of high-performance computing technology across multiple embedded industries.

CYBAVO

CYBAVO

CYBAVO is a cryptocurrency security company founded by experts from the cryptocurrency and security industries.

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance combines insurance expertise with cybersecurity and data talent to deliver clear, effective solutions to protect you for the cyberrisks of today—and tomorrow.

boxxe

boxxe

boxxe create flexible IT infrastructures, collaborative global workspaces and data clarity, all underpinned by world-leading security.

StoneLock

StoneLock

StoneLock is a trusted leader in the design and manufacture of facial recognition software and technology.

BT Security

BT Security

BT provides telecommunications and network infrastructure services to keep businesses around the world connected and secure.

IntegraONE

IntegraONE

IntegraONE is a IT solutions provider offering a full range of networking and technology solutions.

Zerify

Zerify

Zerify offers the industry’s only video conferencing platform built with a zero-trust architecture to keep your meetings secure, private and business compliant.

Check Point Software Technologies

Check Point Software Technologies

Check Point Software Technologies is a leading provider of cyber security solutions to governments and corporate enterprises globally.

CYGNVS

CYGNVS

CYGNVS is a guided cyber crisis response platform providing anytime, anyplace access. A SaaS platform for cyber crisis management – a safe way to connect and control your response.