- Nov 2020
-
cyware.com cyware.com
-
Researchers observed an increase in fraudulent websites using local events and occasions, such as Amazon Prime Day, and the presidential election to lure the victims.In Q3, there has been a significant change in the sectors targeted by cybercriminal activity. The attackers have become more focused on e-commerce services (accounting for 34.70% of domains), followed by IT and telecom (22.20%), and product and mining (13.90%).According to Bolster, approximately 4,000 new phishing and fraudulent websites are created every month using the top 10 brands including Microsoft, Apple, and PayPal, among others.
It's fairly easy to setup a phishing website if you have someone's IP or ISP, you can forward the data they send on the real website to you. There is a lot of other ways to do phishing attacks on websites and people.
-
-
-
Cybercriminals are increasingly targeting media agencies in all possible ways. Apart from direct attacks, cybercriminals misuse the brand name to create fake identities, which are then used to target potential victims.
Cyber attacks are usually sent on people who have influence on people. Media agencies have influence on people because it's where a lot of people get their news, etc, so they are easy targets to get what they're doing across to other people.
-
-
www.theverge.com www.theverge.com
-
Doesn't matter where you put your info, it'll always be obtainable by the government and other companies. The internet is too big to not be compromised.
-
Seemingly innocent cases, like that of “Plane Bae,” are small warning signs on the road to our even more networked future. We are all watching each other, mining each other’s lives for “content” that we give for free to large corporations who then monetize it. “Plane Bae” didn’t just benefit Twitter, a company badly in need of good PR, but also T-Mobile, whose savvy CEO swooped in to offer Blair a reimbursement on the Wi-Fi she purchased to write her thread.
I think this is interesting because people are basically selling whatever info you give them whether it be on social media or signing up for websites, seems like nothing is really private.
-
-
www.oif.ala.org www.oif.ala.org
-
Memes are funny, but I think that consent depends on what it is.
-
Image-based memes involve, primarily, an image created by somebody. Sometimes the meme creator is also the image creator, but often, when involving movie stills or images of celebrities, the image’s copyright is owned by someone else. American copyright law gives creators the exclusive rights of reproduction, modification, distribution, performance, and display. The viral spread of a meme infringes on theses protections as the original image is modified and then displayed, distributed and reproduced when posted and reposted.
Memes are basically just ways of making fun of certain pictures, a lot of the time, they happen to be real people caught at a weird or funny moment and the catchy tag you put on the picture is what makes it funny.
-
-
-
The experience, he added, "reinforces my strong belief that right now, we need to be doing our part to help our communities by listening to the experts at the CDC—we've got to remain vigilant about wearing masks, social distancing, and the basic essentials like washing our hands frequently."
I agree with this, and I think that you more people should follow these set rules so we can get out of the pandemic quicker.
-
-
www.pewresearch.org www.pewresearch.org
-
A majority of U.S. adults (55%) now express at least some support for the movement, down from 67% in June amid nationwide demonstrations sparked by the death of George Floyd.
The death of George Floyd sparked a lot in the BLM movement, and I think that it's good that a higher percentage of people are supporting it.
-
-
twitter.com twitter.com
-
Proud Boys in NYC attack a woman, lunging to get past the NYPD who warns them to stop instigating.
I think this is interesting because it shows how some sightings of how New York people are acting.
-
-
www.theroot.com www.theroot.com
-
The FBI has testified the bureau allocates its resources almost exactly backwards than the problem would suggest,” Rep. Jamie Raskin (D-Md.) said. “Devoting 80 percent of field agents to stopping international terrorism including Islamic extremism and only 20 percent to stopping domestic terrorism including far right and white supremacist extremism
This seems to be accurate, after using the Google search method from Mike Caulfield’s blogpost, many sources say the same thing.
-
-
hapgood.us hapgood.us
-
If you’re a human being reading this on the internet and if you’re not a time traveler from some future, better world, there is less than a one in a hundred chance you do the sort of checks we’re showing regularly. And if you do do this regularly — and not just for the stuff that feels fishy — then my guesstimate is you’re about two to three standard devs out from the mean.
This is interesting because it gives a good analysis of how checking sources is important
-
-
www.edsurge.com www.edsurge.com
-
Computer Science Goes Beyond Coding
Computer Science Goes Beyond Coding
-
-
www.journals.elsevier.com www.journals.elsevier.com
-
Science of Computer Programming
Science of Computer Programming
-