Домой Блог Страница 76654

German police arrest suspect over alleged supermarket extortion attempts

0

German police said on Saturday they had arrested a suspect in the case of an alleged extortionist who attempted to force supermarkets into coughing up tens of millions of euros by slipping a potentially lethal poison into baby food.
BERLIN (Reuters) — German police said on Saturday they had arrested a suspect in the case of an alleged extortionist who attempted to force supermarkets into coughing up tens of millions of euros by slipping a potentially lethal poison into baby food.
Police in the south-western lakeside city of Konstanz said they would ask a judge to approve an extension of custody for the 55-year-old German man arrested by police special forces late on Friday, after concluding he was a prime suspect.
“The suspicions have solidified,” they said in a statement.
In mid-September, a suspect was recorded on security cameras placing quantities of poison in products for sale in some southern German supermarkets. He told the police via email that he done so, and threatened to do it nationwide and elsewhere in Europe unless given money.
Police said they had found some baby food spiked with ethylene glycol, a colorless, odorless liquid used in the manufacture of antifreeze, which can be deadly if consumed.
Police added that, despite the arrest, the public should remain vigilant for signs of tampering when buying food.

© Source: http://www.reuters.com/article/us-germany-extortion-poison/german-police-arrest-suspect-over-alleged-supermarket-extortion-attempts-idUSKCN1C50BU?feedType=RSS&feedName=worldNews&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Reuters%2FworldNews+%28Reuters+World+News%29
All rights are reserved and belongs to a source media.

Norway grants immigration to Israeli nuclear whistleblower

0

Norway grants immigration to Israeli nuclear whistleblower
Israeli nuclear whistleblower Mordechai Vanunu has been granted permission to immigrate to Norway so he can be united with his Norwegian wife.
Vanunu’s wife, Kristin Joachimsen, told Norway’s TV2 channel Friday the couple requested family reunification after they wed in May 2015. It wasn’t clear when he would relocate.
Joachimsen says: «Family values have prevailed.»
Vanunu served 18 years in prison for leaking details and pictures of an alleged Israeli nuclear weapons program to a British newspaper. He sought asylum in Norway after his 2004 release.
Israel then banned him from speaking with foreigners and leaving the country, among other restrictions.
Israel neither confirms nor denies its nuclear weapons capability.
———
This has been corrected to fix the spelling of Mordechai Vanunu’s first name.

© Source: http://abcnews.go.com/International/wireStory/norway-grants-immigration-israeli-nuclear-whistleblower-50195993
All rights are reserved and belongs to a source media.

Microsoft explains why Edge has so few extensions a year down the line

0

It’s now a little more than a year since Microsoft first brought extensions to Edge. After so long you would expect the selection of addons to be overwhelming — but that’s far from being the case. In all, there are only 70-odd…
It’s now a little more than a year since Microsoft first brought extensions to Edge. After so long you would expect the selection of addons to be overwhelming — but that’s far from being the case. In all, there are only 70-odd Edge extensions available, and Microsoft has been moved to explain why.
In a blog post, the company almost apologetically explains that it is «building a thoughtfully curated ecosystem,» citing concern over quality and a fear of diminishing the user experience. What some might describe as «slow,» Microsoft refers to as a «purposefully metered approach» to new extensions, and you probably shouldn’t expect things to speed up a great deal any time soon.
See also:
While there a few big-name extensions available to download — which Microsoft is keen to list in its blog post — progress has been painfully slow. This is, Microsoft explains, because of a hand-curation process and «a high bar for quality.» This will come as little comfort to those who have simply lost patience with the wait for a decent selection of extensions.
Colleen Williams, senior program manager for Microsoft Edge, says:
While Microsoft says that it is looking to make the «onboarding» process easier for developers, it’s likely to be just Windows Insiders who get to see much in the way of new extensions in the near future. Microsoft’s slightly apologetic blog page makes not even the vaguest hint that it’s looking to speed things up, simply saying that it is «adding more [extensions] every week» — so you’re just going to have to keep on waiting.
Photo credit: T. Dallas / Shutterstock

© Source: https://betanews.com/2017/09/30/microsoft-edge-extensions/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed+-+bn+-+BetaNews+Latest+News+Articles
All rights are reserved and belongs to a source media.

Łapiński: Prezydent nie zgodzi się na…

0

Jeżeli zmiany, czy poprawki, które zostaną naniesione w Sejmie do projektów prezydenta dot. KRS i SN «wypaczą» je, będą niezgodne z intencjami prezydenta, to na to zgody prezydenta nie będzie — powiedział w sobotę rzecznik prezydenta Krzysztof Łapiński.
Prezydent Andrzej Duda w poniedziałek zaprezentował swe projekty ustaw dotyczących Sądu Najwyższego i Krajowej Rady Sądownictwa. Przygotowanie ich prezydent zapowiedział w lipcu po zawetowaniu dotyczących tych kwestii ustaw autorstwa PiS. Jak mówił w sobotę w radiowej Trójce Łapiński, prezydent Andrzej Duda dotrzymał słowa i dwa miesiące po zawetowaniu przez niego poprzednich dwóch ustaw, przedstawił swoje projekty. «Przedstawił je w poniedziałek, we wtorek trafiły one już do Sejmu, są już u marszałka Sejmu i to jest bardzo dobra wiadomość, bo pokazuje, że można składać publiczne deklaracje i się z nich wywiązywać» — powiedział rzecznik. Jak dodał, prezydent jest «otwarty na prace i ewentualne zmiany» Parlamentu odnośnie tych projektów. «Prezydent powiedział mniej więcej tak: Szanowni państwo, Parlament jest władzą niezależną od prezydenta, suwerenną. Ja nie oczekuję, że będziecie państwo moim notariuszem, to znaczy, że te ustawy, które do was zgłoszę, będą takie same na koniec prac parlamentarnych, że nie zmieni się żadna kropka, żaden przecinek. Wiem, macie do tego prawo, możecie nad tym pracować» — mówił Łapiński. Zaznaczył jednak, że prezydent zastrzegł jednocześnie, że «jeżeli te zmiany, czy poprawki, które zostaną naniesione w Sejmie» wypaczą jego projekt, będą niezgodne z jego intencjami, to na to jego zgody nie będzie. Rzecznik dodał, że teraz wszystko w sprawie prezydenckich projektów jest po stronie Sejmu. A reprezentujący prezydenta będą przyglądać się tym pracom. Poseł Jacek Sasin (PiS) uważa, że należy szukać rozwiązania, «które wszystkie patologie, które ten system stworzony przy Okrągłym Stole ujawnił — zlikwidują». «Dzisiaj musimy szukać rozwiązań, rzeczywiście, które da się wprowadzić na gruncie obowiązującej Konstytucji, której niestety nie da się zmienić — bo uważamy, że ta zmiana jest potrzebna, a przy tym układzie w Sejmie tego zrobić się nie da — a które jednocześnie będą oznaczały realną zmianę w polskim sądownictwie. I oczywiście uważamy, że takimi ustawami, które dobrze tą zmianę wprowadzały — były ustawy przyjęte przez Parlament przed wakacjami» — powiedział. Zaznaczył jednocześnie, że «to już jest oczywiście historia», gdyż prezydent te ustawy zawetował. «Mamy dzisiaj nową sytuację, mamy nowe projekty i ja przyjmuję z dużą nadzieją, te słowa (…) o przekonaniu pana prezydenta, że Sejm ma prawo jednak tutaj pewnych korekt dokonywać» — powiedział. «Chcielibyśmy dokonywać tych zmian w porozumieniu z prezydentem. Uważamy, że to jest najlepsza droga. Prezydent, jako autor tych projektów i ten, który na końcu będzie decydował o tym, czy one wejdą w życie, żeby w ten proces był zaangażowany, ta rozmowa jest potrzebna» — tłumaczył Sasin. «Prezydentowi zależy chociażby na tym wyborze większością 3/5 głosów. To nie był pomysł, który nam, jako Prawu i Sprawiedliwości się podobał, ale akceptujemy to oczekiwanie prezydenta. Ale musimy wspólnie rzeczywiście szukać rozwiązań» — zaznaczył. W projekcie dot. KRS Andrzej Duda początkowo zaproponował mechanizm, który zakładał, że gdy w terminie dwóch miesięcy Sejm nie wybierze większością 3/5 głosów sędziów do KRS, to wyboru spośród kandydatów zgłoszonych Sejmowi będzie dokonywał prezydent. W związku z tym przygotowany został też projekt zmiany konstytucji pozwalający prezydentowi dokonać nominacji członków KRS w sytuacji, gdy Sejm ich nie wybierze. W tej sprawie Duda spotkał się z przedstawicielami klubów parlamentarnych (w spotkaniu nie wzięli udziału jedynie politycy PO). Po spotkaniu prezydent poinformował o nowej propozycji — zgodnie z nią, gdy nie uda się w Sejmie wybrać członków KRS większością 3/5 głosów, w kolejnym etapie każdy poseł będzie mógł głosować tylko na jednego kandydata. Sasin był pytany o to, czy dopuszcza możliwość, iż te ustawy w tej kadencji nie zostaną uchwalone. «Nie. Nie dopuszczam takiej możliwości. Ustawy są w tej chwili w Parlamencie. Myślę, że przy dobrej woli i współpracy autora przede wszystkim tych ustaw (…), na pewno uda się tę reformę zrealizować» — ocenił. Wicemarszałek Sejmu Stanisław Tyszka (Kukiz’15) mówił, że w reformie sądownictwa «chodzi o to, żeby jedna partia nie mogła decydować o kształcie tych najwyższych instytucji sądowych — czyli w tym momencie Prawo i Sprawiedliwość». «Kiedyś będzie inna partia. Dlatego proponowaliśmy — i prezydent się do tego przychylił i jesteśmy mu za to wdzięczni — wybór przez 3/5 KRS, tak, żeby trzeba było szukać pewnej zgody, konsensusu ponadpartyjnego» — mówił. Jak przekazał, Kukiz’15 chce zaproponować «taką reformę sądów, która rzeczywiście da coś obywatelom». «Obywatele narzekają przede wszystkim na przewlekłość postępowań sądowych. W związku z tym, my zaproponujemy koncepcję wybieranych przez obywateli sędziów pokoju do spraw najprostszych» — powiedział. Wicemarszałek Sejmu Barbara Dolniak (Nowoczesna) odniosła się do propozycji prezydenckiej o nadzwyczajnym środku zaskarżenia orzeczeń sądowych. «Przeczytałam ten projekt. I jest wyraźny zapis, kto będzie wnosił środki nadzwyczajne. I to Sąd Najwyższy będzie oceniał, czy dany środek odwoławczy zasługuje na uwzględnienie w tym pierwszym etapie, czy może być wniesiony, czy nie może być wniesiony. To są lata pracy. I tak reformujecie wymiar sprawiedliwości» — powiedziała. Zdaniem posła Rafała Grupińskiego (PO) Prawo i Sprawiedliwość «dzisiaj żąda dla siebie wszystkiego». «Łamie wszelkie proporcje, jeśli chodzi o ustalenia międzyklubowe, łamie wszelkie zasady w Parlamencie i łamie regulamin» — ocenił.

© Source: http://gosc.pl/doc/4214347.Lapinski-Prezydent-nie-zgodzi-sie-na
All rights are reserved and belongs to a source media.

Трамп доручив своєму держсектарю посилити санкції проти РФ

0

Новини, публікації, інсайдерська інформація про економічні, політичні, культурні та суспільні процеси в Україні та світі.
США планують подальше посилення санкцій проти енергетичного і банківського секторів економіки Росії, що були накладені через її агресію проти України.
Про це повідомили в Міністерстві фінансів США, передає Радіо Свобода.
Для таких російських компаній із енергетичного сектора термін, на який їм можуть бути надані кредити, скоротиться до 60 днів із нинішніх 90, а для підсанкційних компаній із фінансового сектора – до 14 днів із нинішніх 30.
Як пише AFP, під удар потрапляють такі великі російські банки, як «Сбербанк», «Внешэкономбанк», «Росэксимбанк» та «ВТБ Банк», а також енергетичні гіганти, включаючи «Газпром», «Лукойл» та «Транснефть».
Президент США Дональд Трамп опублікував меморандум, в якому делегував держсекретарю Рексу Тіллерсону свої повноваження щодо виконання санкцій відносно РФ за агресію проти України.
Таким чином, Тіллерсон отримав функції та повноваженя в рамках виконання Акту про протидію супротивникам Америки через Закон про санкції 2017 року, Закону про підтримку свободи України від 2014 року і Закону про підтримку суверенітету, цілісності, демократії і економічної стабільності України від 2014 року.
Також Тіллерсон у погодженні з міністром фінансів США Стівеном Мнучіном контролюватиме виконання санкцій щодо Північної Кореї.
Раніше американські сенатори Джон Маккейн і Бен Кардін звернулися до Трампа з листом із вимогою почати виконувати прийнятий Конгресом закон про нові санкції щодо Росії.

© Source: http://www.theinsider.ua/politics/59cf5269b5866/
All rights are reserved and belongs to a source media.

Ситуація у Калинівці неконтрольовані вибухи припинились

0

Станом на ранок суботи на складах боєприпасів у районі Калинівки на Вінниччині припинились неконтрольовані вибухи загрози для місцевих немає
Про це повідомляє Державна служба з надзвичайних ситуацій.
«Станом на 08:30 30 вересня 2017 року неконтрольованих вибухів та виникнення осередків пожеж на технічній території арсеналу не спостерігається, але під час роботи важкої інженерної техніки військових груп розмінування відбуваються підриви окремих вибухонебезпечних предметів під мінними тралами», — йдеться у повідомленні.

© Source: http://vgolos.com.ua/news/sytuatsiya_u_kalynivtsi_nekontrolovani_vybuhy_prypynylys__dsns_284391.html
All rights are reserved and belongs to a source media.

Міністр охорони здоров'я США подав у відставку через скандал з приватними літаками

0

Американський міністр охорони здоров’я Том Прайс подав у відставку
Том Прайс
КИЇВ. 30 вересня. УНН. Американський міністр охорони здоров’я Том Прайс подав у відставку після того, як його звинуватили у використанні приватних літаків для офіційних подорожей, передає УНН з посиланням на ВВС Україна.
Повідомляється, що президент Трамп прийняв відставку міністра охорони здоров’я. Виконувати обов’язки міністра буде Дон Райт, колишній заступник Прайса.
У листі із проханням про відставку, який цитує New York Times, Том Прайс висловлює жаль з приводу того, що «останні події відволікли увагу» від роботи, яку здійснює його міністерство.
Посадові особи у США, за винятком тих, чия діяльність пов’язана із питаннями державної безпеки, повинні користуватися комерційними рейсами, виконуючи свої державні обов’язки.
Також за даними видання, увага громадськості також прикута до ще трьох членів адміністрації президента Трампа, які користуються приватними літаками.
Як повідомляв УНН, президент США Дональд Трамп звільнив головного радника зі стратегічних питань Стівена Беннона.

© Source: http://www.unn.com.ua/uk/news/1690579-ministr-okhorony-zdorovia-ssha-podav-u-vidstavku-cherez-skandal-z-pryvatnymy-litakamy
All rights are reserved and belongs to a source media.

A 4-Step Guide to Building Continuous Security Into Container Deployment

0

Containers face security risks at every stage, from building to shipping to the run-time production phases. Securing them requires a layered strategy throughout the stack and the deployment process.
Containers face numerous security risks at every stage of the deployment process, from building to shipping to the run-time production phases. These threats make achieving continuous security essential to the integrity and safety of containers. However, often these security measures are skipped or overlooked in the rush to get the CI/CD pipeline flowing faster. Many businesses are paying the price today for poor security implemented years ago. Hopefully, these mistakes won’t be repeated in the migration to a containerized environment.
Risks to containers and their hosts come in many forms: ransomware, application-level DDoS and cross-site scripting attacks, compromised containers that download extra malware or hunt for sensitive data or weaknesses in internal systems, container breakouts allowing unauthorized access across systems, containers forced to eat up system resources to crash other containers, and plenty others.
Many of these attacks start with previously undetected vulnerabilities that can lie dormant for years. Attackers exploit these to gain a foothold, and then expand into other hosts or containers.
Recent ransomware attacks have exploited various vulnerabilities, including open ports, remote code execution, and other application liabilities.
WannaCry/WannaCrypt is basically attacking Microsoft Windows vulnerabilities on SMB, RDP, and IIS service ports like 445. Like most attacks, there is a «kill chain» of events that leads to the ransomware demand.
Once attackers are able to get inside a network they spread laterally in an ‘east-west’ direction. Doing that has become much easier in a containerized environment due to the lack of visibility into east-west container traffic.
SambaCry is a 7-year-old critical remote code execution vulnerability ( CVE-2017-7494) discovered in the Samba networking software that could allow a remote attacker to take control of an affected Linux system. Today, if you have your CVE database updated in time, vulnerability scanning software could help to find this CVE in container images. Other techniques can also help detect a privilege escalation or breakout.
ElasticSearch and MongoDB are two of the most popular application container downloads from Docker Hub. Surprisingly simple attacks involving open ports and passwords could allow these to be used for ransomware. Basic container security precautions could prevent such an attack. Frequent auditing and testing of host and container security settings would highlight risks introduced by the latest application updates or host deployments.
The Dirty Cow ( CVE-2016-5195) kernel exploit is used by attackers to overwrite a so-called setuid program in the system. By replacing the setuid program, the attacker gains root access privilege when the program is executed, and is then able to do whatever they want. While an attacker can perform destructive acts, it is more likely that at this point they will try to expand to other systems or applications as stealthily as possible. It’s even possible for the exploit to stick around in a container environment, even when the infected containers are destroyed.
The Linux Stack Clash vulnerability ( CVE-2010-2240) was recently discovered by Qualys security researchers and has been named «Stack Clash» because it involves «clashing» the stack with another memory region, such as the heap. While this is a local exploit in the user space, it can still give attackers a foothold into the operating system or kernel. Stack Clash could be used with other exploits to wreak even more havoc on systems and potentially move laterally. For example, a recent sudo vulnerability ( CVE-2017-100367) could be combined with Stack Clash to be able to run arbitrary code with root privileges.
Every successful attack involves a ‘kill chain’ of events, and detection is possible at multiple points using various techniques. Generally, to mitigate these risks in a container environment, the following security measures should be taken:
Curtailing these threats requires a layered security strategy that is implemented to prevent issues throughout the stack and at each phase of the deployment process. The correct security controls and automated tests to detect and address attacks and other issues are critical components for ensuring effective and secure applications.
Here are the measures you can put in place throughout the container deployment process to enact continuous security.
Continuous security begins with building secure applications. Developers must understand and utilize proper techniques for minimizing risk within the application code itself. These techniques include:
Code analysis – Developers should make use of code analysis tools that can recognize and report any potential vulnerabilities.
Hardening – Reduce the attack surface of the container image by removing any libraries and packages that aren’t needed, and by restricting non-required functions.
Image Scanning – Just before the ship phase, container images should be scanned for vulnerabilities in order to catch any issues before the application is built. Registry scanning should also be done regularly, as this can find new issues in existing images.
As a practical matter of executing these security measures, they should be automated into the delivery process/pipeline using adequate tools, as doing so ensures they are performed continuously and without fail.
When preparing to deploy images, security depends on the right controls and verifications in place to ensure trust. These include:
Image signing – This ensures that the author / publisher is verified and that no image tampering has occurred. For example, Docker’s Content Trust feature provides this security.
User access controls – Sensitive systems and deployment tools (registries, orchestration tools, etc.) should have mechanisms in place to effectively enforce restrictions and monitor for user access.
In order to automate these security features to facilitate continuous security, images for production use should be signed and tagged automatically. Access controls for sensitive tools should be integrated with Active Directory, or LDAP directories. Docker Bench for Security can be run as an automated process to test content trust and access control issues.
Ahead of running application containers live in production, the run-time environment needs to be secured – including the host, kernel, Docker daemon, and all network and system services.
Host and kernel security – These can be safeguarded using security modules such as AppArmor, SELinux, seccomp, or the equivalent host security settings.
System and Docker daemon security – Make sure that only authorized users can access sensitive systems and Docker commands and settings.
Secrets Management – Utilize encryption to protect secrets that are subject to application and API access.
Auditing – Perform audits of security settings both before and during run-time. This can be accomplished using the previously mentioned Docker Bench for Security, Kubernetes CIS Benchmark, or other tools, and has the additional benefit of helping to meet container compliance requirements.
Orchestration security & networking – Secure the container environment by using container management and orchestration tools capable of controlling access, setting network policies and appropriate names and labels. These tools can also make sure that security containers are running on every host.
These orchestration and integrated security tools can deliver automated security testing and checks against standard benchmarks, as well as automatic policy updates to adapt to configuration changes and offer clearer visualization of behavior within the application and containers.
Run-time in production environments is the most crucial phase when it comes to container security. This is the battleground where hackers will attempt to exploit any vulnerabilities they’ve discovered, and security efforts must detect and thwart those attempts. Hacker actions will include a «kill chain,» the series of events that occur as the hacker moves from the host or another container to the targeted exploit point. This chain of events often presents several chances for the hacker’s activities to be detected and prevented, using these techniques:
Network inspection & visualization – Inspecting network behavior is the most opportune vantage point for monitoring and recognizing suspicious activity. Be sure to inspect all container-to-container connections, as well as container and host processes, and visualize application stack behavior. If an attack spreads and real-time response is necessary, these capabilities will enable the security team to see it coming and respond.
Layer 7 -based application isolation – Go beyond L3/4 network segmentation by also isolating and protecting based on application protocols and container meta-data inspection. As necessary, application activity can be blocked without affecting containers.
Threat detection – Monitor applications, always remaining on the lookout for DDoS, DNS, or other varieties of network-based application attacks.
Privilege escalation detection – Hacking efforts may attempt to grant greater administrative privileges to unauthorized intruders. Detect these escalations on hosts and containers to foresee break outs and defend against such attacks.
Container quarantine – When a container exhibits suspicious behavior, have the ability to quarantine it for safety while the container is investigated.
Run-time vulnerability scanning – All running containers should be scanned for vulnerabilities; all newly created containers should be scanned immediately as well.
Packet capture & event logging – Capturing packets and creating event logs allows for more capable forensics efforts.
Tools that enable these security measures should be automatically deployed to each host, and new container behavior should be learned automatically or added to the security policy programmatically. Real-time monitoring and alerts can be managed from either local consoles or logs exported to SIEM systems.
With the right strategy in place to integrate security tools and automate policy, continuous container security that offers protection throughout the container deployment process can be achieved.
Fei Huang is the Co-Founder & CEO of NeuVector, a Docker container network security solution that uses behavioral learning to secure containers during run-time. Fei has over 20 years of experience in enterprise security, virtualization, cloud and embedded software. He was part of the founding team of Cloudvolumes (acquired by VMware) and co-founder of Provilla, a DLP security company (acquired by TrendMicro). Fei holds several patents in security, virtualization and software architecture.

© Source: https://www.infoq.com/articles/building-continuous-security-containers-deployment?utm_campaign=infoq_content&utm_source=infoq&utm_medium=feed&utm_term=global
All rights are reserved and belongs to a source media.

How to survive in the fake-information age

0

Understanding the emerging world of ‘fake everything’ is vital for figuring out what you and your company can do about it.
«Information wants to be free.»
That was the motto of truth-seeking digital activists in the ’80s and ’90s.
The motto today is: «Information wants to be fake.»
Just look at the news this week for a glimpse of how much chaos fake news is causing.
Facebook, Twitter and Google are being dragged before Congress to tell what they know about fake news, trolling and propaganda funded by the Russian government on those social networks.
It appears that the Russian government bought hundreds of thousands of dollars in advertising on Facebook and Twitter aimed primarily at exacerbating existing social and political conflict within the United States. It also appeared to have maintained fake user accounts designed to influence voters in key swing states leading up to the presidential election.
The activity, however, isn’t just an election-cycle phenomenon. It continues.
Senator James Lankford (R-Okla.) pointed out this week that Russian troll farms are stoking both sides of the debate over NFL players protesting during games, urging Americans to join kneeling players in protest, and also to boycott the NFL over kneeling players.
One recent tweet on a Twitter account called «Boston Antifa» came from a poster who apparently forgot to remove the location stamp. The location wasn’t Boston, but Vladivostok, Russia.
Such is the nature of our age that some said even the time stamp may have been faked to smear Russia.
Nobody knows what’s true.
Buzzfeed reported this week on the rising readership of content farms based overseas in places such as the Philippines, Pakistan and Macedonia. Such «publications» exist solely for profit. They don’t care what’s true. They just care what goes viral.
The article points out that genuine publications by Native Americans about Native American matters are being driven out of business by online «Native American» news sites based in Kosovo and Vietnam. These foreign sites make their money in part by selling merchandise based on images stolen from actual Native American artists.
Fake online information by its very nature either degrades or exploits trusted sources of information.
The president of the United States, for example, has reportedly quoted bots — fake humans with fake accounts — on Twitter at least 152 times. The president himself is often the source of false information.
Fake information goes beyond false news published as truth. Brand counterfeiting also presents threats to enterprises.
LEGO sets sold in China are often fake — not made by LEGO. But a counterfeit LEGO set recently went too far with ISIS themes, with one set including a plastic decapitated head.
The world’s consumer markets are flooded with everything from fake honey to fake sneakers .
Google recently announced refunds to advertisers over fake traffic .
Some fake-information sources benefit from the existence of trusted sources of information. Because you trust a source, they can cause mayhem by using your trust to socially engineer you into doing something.
Hackers hide malicious code inside fake security updates. If you believe it’s an authorized security update, you’ll install unknown code on your system or network.
A fake law firm recently convinced Amazon to remove a product, costing the seller some $200,000.
You can’t even trust people selling adorable puppies. Up to 80% of online ads for puppies are fake, according to the Better Business Bureau.
Fake news is such a «thing» that Dictionary.com is even adding an entry for it in its next update.
The rise of false information online is caused by five factors:
1. The Internet allows anyone anywhere to publish anything everywhere.
2. Digital content is easy to counterfeit or modify.
3. Many people have powerful incentives to spread false information.
4. It’s easier for social network algorithms to favor emotionally reactive content than true content.
5. The public increasingly relies upon digital internet content for «knowledge.»
Facebook, Twitter and Google claim that they’re taking active measures against the rise of fake information. But previous efforts have failed.
The reality is that fake information will continue to be spread online. And that could be a problem for you and your company.
Consider a recent report in the Financial Times about a «Chinese edition» of The Wall Street Journal. The site copied the look and feel of the Journal’s legitimate website, and used the Journal’s reputation to attract Chinese-speaking intellectuals globally. The articles themselves were copied from China’s state-run Xinhua news agency, which is supervised by the Chinese Communist Party’s propaganda arm.
The Wall Street Journal’s hard-won reputation was being used as a spoonful of sugar to help the propaganda go down.
Here’s the bad part: The Journal wasn’t even aware of the fake site until contacted about it by a reporter.
It’s time for enterprises of all kinds to come to terms with the new reality of fake information online. The worse the fake information problem gets online, the more valuable trusted sources of information become.
The most important action is to make sure you, your department and your company are purveyors of factual information in marketing and in all business communication. It’s important to understand that the role of a brand as a trusted source of information is more important than ever. Aggressively seek out fake information falsely attributed to your company, and do all you can to stop it from happening.
Don’t fall into the nothing-has-really-changed complacency of believing that today’s fake-news problem is comparable to yesterday’s. Fake information is different now because it’s computer-assisted, global and massively crowdsourced. Fake news is a tech problem.
Boycott the companies, including the social networks, that are acting as part of the problem, rather than part of the solution.
Support the companies that fight for facts, including media publishing companies. You can do this with advertising dollars, subscriptions and other forms of support.
Pressure the government to crack down on fake sources of information.
Fake news is bad for business. And it’s everybody’s problem. The solution starts with you and your company.

© Source: https://www.computerworld.com/article/3229925/internet/how-to-survive-in-the-fake-information-age.html
All rights are reserved and belongs to a source media.

13 questions for Luke Wood, the President of Beats

0

With its flagship Studio3 Wireless headphone shipping soon, the head of Beats by Dr. Dre answers a few questions from CNET.
Luke Wood joined Beats by Dr. Dre in 2011, becoming its president and COO.
Wood’s roots in the music industry go deep. A guitarist and producer, he began his career in 1991 with Geffen Records as a director of publicity, working with such bands as Sonic Youth and Nirvana. With his own band, Sammy, he released an EP and two full-length albums. He later became chief strategy officer of Interscope Geffen A&M (IGA). Doing double duty as president of Geffen’s DGC Records imprint, he worked with a wide range of well-known artists, including All American Rejects, Weezer, the Yeah Yeahs and Rise Against.
In our portfolio, we have a product designed for every lifestyle and use case. We don’t just change the design for the sake of making it look like a new product, but we instead focus on how we can improve the internal DNA to take full advantage of our acoustic designs that have become iconic and synonymous with the Beats brand.

© Source: https://www.cnet.com/news/q-a-with-beats-president-luke-wood/
All rights are reserved and belongs to a source media.

Timeline words data