Tag Archives: safety

Twitter publishes dump of accounts tied to Russian, Iranian influence campaigns

Enlarge / This image was the profile banner of one of the accounts allegedly run by the Internet Research Agency, the organization that ran social media "influence campaigns" in Russia, Germany, Ukraine, and the US dating back to 2009. (credit: A Russian Troll) Twitter has released a data store of posts from 3,841 accounts that have been identified as being connected to the Internet Research Agency (IRA), the Russian "troll factory" that used Twitter and Facebook to conduct an "influence campaign" aimed at causing political turmoil during the 2016 US presidential election as well as undermining the political process in other countries, including Germany and Ukraine. The company has also released another set of data connected to 770 accounts believed to be connected with an Iranian influence campaign. Totaling over 360 gigabytes—including more than 10 million tweets and associated metadata, and over 2 million images, animated GIFs, videos and Periscope streams—the data store provides a picture of how state-sponsored agencies have used the Twitter platform. Some of the content dates back as far as 2009. In a post announcing the release , Twitter Legal, Policy and Trust & Safety lead Vijaya Gadde and Twitter's head of Site Integrity Yoel Roth wrote that Twitter was providing the data "with the goal of encouraging open research and investigation of state-sponsored influence and information campaigns from researchers and academics around the world." Read 6 remaining paragraphs | Comments

Read More »

Iot Safety Architecture & Risk Assessment Toolkit Updated…

Agelight Digital Trust Advisory Group released a major update to the IoT Safety Architecture to help maximize IoT security, privacy and safety, harmonizing global efforts and regulations (PRWeb October 18, 2018) Read the full story at https://www.prweb.com/releases/iot_safety_architecture_risk_assessment_toolkit_updated_addressing_device_hazardization_risks_and_evolving_regulatory_landscape/prweb15849418.htm

Read More »

The Best Deep Fryer

By Michael Sullivan This post was done in partnership with Wirecutter. When readers choose to buy Wirecutter's independently chosen editorial picks, Wirecutter and Engadget may earn affiliate commission. Read the full deep fryer guide here.

Read More »

Want to reduce fraud? Make a better password, dummy!

Researchers at Indiana University have confirmed that stringent password policies – aside from being really annoying – actually work. The research , led by Ph.D. student Jacob Abbott, IU CIO Daniel Calarco, and professor L. Jean Camp. They published their findings in a paper entitled “Factors Influencing Password Reuse: A Case Study.” “Our paper shows that passphrase requirements such as a 15-character minimum length deter the vast majority of IU users (99.98 percent) from reusing passwords or passphrases on other sites,” said Abbott. “Other universities with fewer password requirements had reuse rates potentially as high as 40 percent.” To investigate the impact of policy on password reuse, the study analyzed password policies from 22 different U.S. universities, including their home institution, IU. Next, they extracted sets of emails and passwords from two large data sets that were published online and contained over 1.3 billion email addresses and password combinations. Based on email addresses belonging to a university’s domain, passwords were compiled and compared against a university’s official password policy. The findings were clear: Stringent password rules significantly lower a university’s risk of personal data breaches. In short, requiring longer passwords and creating a truly stringent password policy reduced fraud and password reuse by almost 99%. Further, the researchers found that preventing users from adding their name or username inside passwords its also pretty helpful

Read More »

Axios Autonomous Vehicles – Axios

Axios Axios Autonomous Vehicles Axios Just ask Blackberry . What's next: Ford is using its commercial vehicles expertise to develop routing and dispatch technology for fleet management, and is building out a transportation-as-a-service platform to integrate with its business partners. The ... and more »

Read More »

UK’s mass surveillance regime violated human rights law, finds ECHR

In another blow to the UK government’s record on bulk data handling for intelligence purposes the European Court of Human Rights (ECHR) has ruled that state surveillance practices violated human rights law. Arguments against the UK intelligence agencies’ bulk collection and data sharing practices were heard by the court in November last year . In today’s ruling the ECHR has ruled that only some aspects of the UK’s surveillance regime violate human rights law. So it’s not all bad news for the government — which has faced a barrage of legal actions (and quite a few black marks against its spying practices in recent years) ever since its love affair with mass surveillance was revealed and denounced by NSA whistleblower Edward Snowden, back in 2013. The judgement reinforces a sense that the government has been seeking to push as close to the legal line as possible on surveillance, and sometimes stepping over it — reinforcing earlier strikes against legislation for not setting tight enough boundaries to surveillance powers, and likely providing additional fuel for fresh challenges. The complaints before the ECHR focused on three different surveillance regimes: 1) The bulk interception of communications (aka ‘mass surveillance’); 2) Intelligence sharing with foreign governments; and 3) The obtaining of communications data from communications service providers. The challenge actually combines three cases, with the action brought by a coalition of civil and human rights campaigners, including the American Civil Liberties Union, Amnesty International, Big Brother Watch, Liberty, Privacy International and nine other human rights and journalism groups based in Europe, Africa, Asia and the Americas. The Chamber judgment from the ECHR found, by a majority of five votes to two, that the UK’s bulk interception regime violates Article 8 of the European Convention on Human Rights (a right to respect for private and family life/communications) — on the grounds that “t here was insufficient oversight both of the selection of Internet bearers for interception and the filtering; search and selection of intercepted communications for examination; and the safeguards governing the selection of ‘related communications data’ for examination were inadequate”. The judges did not find bulk collection itself to be in violation of the convention but noted that such a regime must respect criteria set down in case law. In an even more pronounced majority vote, the Chamber found by six votes to one that the UK government’s regime for obtaining data from communications service providers violated Article 8 as it was “not in accordance with the law”. While both the bulk interception regime and the regime for obtaining communications data from communications service providers were deemed to have violated Article 10 of the Convention (the right to freedom of expression and information,) as the judges found there were insufficient safeguards in respect of confidential journalistic material

Read More »

Remember the driver disguised as a car seat? That helped Ford develop a self-driving ‘language.’ – Mashable

Mashable Remember the driver disguised as a car seat? That helped Ford develop a self-driving 'language.' Mashable Sure enough, Ford is working on its "human machine interface," which includes a mobile app and a touchscreen and digital voice inside the car. Passengers will press a button on a screen when they are ready to go, it said. Information from the car will ... and more »

Read More »