Enlarge / This image was the profile banner of one of the accounts allegedly run by the Internet Research Agency, the organization that ran social media "influence campaigns" in Russia, Germany, Ukraine, and the US dating back to 2009. (credit: A Russian Troll) Twitter has released a data store of posts from 3,841 accounts that have been identified as being connected to the Internet Research Agency (IRA), the Russian "troll factory" that used Twitter and Facebook to conduct an "influence campaign" aimed at causing political turmoil during the 2016 US presidential election as well as undermining the political process in other countries, including Germany and Ukraine. The company has also released another set of data connected to 770 accounts believed to be connected with an Iranian influence campaign. Totaling over 360 gigabytes—including more than 10 million tweets and associated metadata, and over 2 million images, animated GIFs, videos and Periscope streams—the data store provides a picture of how state-sponsored agencies have used the Twitter platform. Some of the content dates back as far as 2009. In a post announcing the release , Twitter Legal, Policy and Trust & Safety lead Vijaya Gadde and Twitter's head of Site Integrity Yoel Roth wrote that Twitter was providing the data "with the goal of encouraging open research and investigation of state-sponsored influence and information campaigns from researchers and academics around the world." Read 6 remaining paragraphs | Comments
Read More »Iot Safety Architecture & Risk Assessment Toolkit Updated…
Agelight Digital Trust Advisory Group released a major update to the IoT Safety Architecture to help maximize IoT security, privacy and safety, harmonizing global efforts and regulations (PRWeb October 18, 2018) Read the full story at https://www.prweb.com/releases/iot_safety_architecture_risk_assessment_toolkit_updated_addressing_device_hazardization_risks_and_evolving_regulatory_landscape/prweb15849418.htm
Read More »Uber brings app safety features to more drivers and riders – CNET
The Safety Toolkit is heading to two dozen countries.
Read More »Hensel Certo 200 and Certo 400 Compact Flashes
Hensel is introducing the Certo 200 and Certo 400, two new compact flash units especially tailored to ambitious amateurs, semiprofessional users, and new professionals starting out.
Read More »The Best Deep Fryer
By Michael Sullivan This post was done in partnership with Wirecutter. When readers choose to buy Wirecutter's independently chosen editorial picks, Wirecutter and Engadget may earn affiliate commission. Read the full deep fryer guide here.
Read More »Want to reduce fraud? Make a better password, dummy!
Researchers at Indiana University have confirmed that stringent password policies – aside from being really annoying – actually work. The research , led by Ph.D. student Jacob Abbott, IU CIO Daniel Calarco, and professor L. Jean Camp. They published their findings in a paper entitled “Factors Influencing Password Reuse: A Case Study.” “Our paper shows that passphrase requirements such as a 15-character minimum length deter the vast majority of IU users (99.98 percent) from reusing passwords or passphrases on other sites,” said Abbott. “Other universities with fewer password requirements had reuse rates potentially as high as 40 percent.” To investigate the impact of policy on password reuse, the study analyzed password policies from 22 different U.S. universities, including their home institution, IU. Next, they extracted sets of emails and passwords from two large data sets that were published online and contained over 1.3 billion email addresses and password combinations. Based on email addresses belonging to a university’s domain, passwords were compiled and compared against a university’s official password policy. The findings were clear: Stringent password rules significantly lower a university’s risk of personal data breaches. In short, requiring longer passwords and creating a truly stringent password policy reduced fraud and password reuse by almost 99%. Further, the researchers found that preventing users from adding their name or username inside passwords its also pretty helpful
Read More »Arizona is creating an autonomous vehicle research institute
Arizona, a state that has been quite open to self-driving technology, has now created the Institute for Automated Mobility (IAM), a consortium focused on autonomous vehicle research, safety and policy. Overseen by the Arizona Commerce Authority, IAM...
Read More »Arizona is creating an autonomous vehicle research institute
Arizona, a state that has been quite open to self-driving technology, has now created the Institute for Automated Mobility (IAM), a consortium focused on autonomous vehicle research, safety and policy. Overseen by the Arizona Commerce Authority, IAM...
Read More »Axios Autonomous Vehicles – Axios
Axios Axios Autonomous Vehicles Axios Just ask Blackberry . What's next: Ford is using its commercial vehicles expertise to develop routing and dispatch technology for fleet management, and is building out a transportation-as-a-service platform to integrate with its business partners. The ... and more »
Read More »Axios Autonomous Vehicles – October 12, 2018 – Axios – Axios
Axios Axios Autonomous Vehicles - October 12, 2018 - Axios Axios Good morning! Welcome to Axios Autonomous Vehicles. Thanks for reading. Please share the newsletter and tell your friends they can subscribe here. and more »
Read More »Google is giving parents a toolkit to educate kids on internet safety
Google and the National Parent Teacher Association are joining forces to help educate parents and kids about online safety. The search giant will give out all-in-one kits that include a Google Pixelbook and presentations covering a variety of topics...
Read More »UK’s mass surveillance regime violated human rights law, finds ECHR
In another blow to the UK government’s record on bulk data handling for intelligence purposes the European Court of Human Rights (ECHR) has ruled that state surveillance practices violated human rights law. Arguments against the UK intelligence agencies’ bulk collection and data sharing practices were heard by the court in November last year . In today’s ruling the ECHR has ruled that only some aspects of the UK’s surveillance regime violate human rights law. So it’s not all bad news for the government — which has faced a barrage of legal actions (and quite a few black marks against its spying practices in recent years) ever since its love affair with mass surveillance was revealed and denounced by NSA whistleblower Edward Snowden, back in 2013. The judgement reinforces a sense that the government has been seeking to push as close to the legal line as possible on surveillance, and sometimes stepping over it — reinforcing earlier strikes against legislation for not setting tight enough boundaries to surveillance powers, and likely providing additional fuel for fresh challenges. The complaints before the ECHR focused on three different surveillance regimes: 1) The bulk interception of communications (aka ‘mass surveillance’); 2) Intelligence sharing with foreign governments; and 3) The obtaining of communications data from communications service providers. The challenge actually combines three cases, with the action brought by a coalition of civil and human rights campaigners, including the American Civil Liberties Union, Amnesty International, Big Brother Watch, Liberty, Privacy International and nine other human rights and journalism groups based in Europe, Africa, Asia and the Americas. The Chamber judgment from the ECHR found, by a majority of five votes to two, that the UK’s bulk interception regime violates Article 8 of the European Convention on Human Rights (a right to respect for private and family life/communications) — on the grounds that “t here was insufficient oversight both of the selection of Internet bearers for interception and the filtering; search and selection of intercepted communications for examination; and the safeguards governing the selection of ‘related communications data’ for examination were inadequate”. The judges did not find bulk collection itself to be in violation of the convention but noted that such a regime must respect criteria set down in case law. In an even more pronounced majority vote, the Chamber found by six votes to one that the UK government’s regime for obtaining data from communications service providers violated Article 8 as it was “not in accordance with the law”. While both the bulk interception regime and the regime for obtaining communications data from communications service providers were deemed to have violated Article 10 of the Convention (the right to freedom of expression and information,) as the judges found there were insufficient safeguards in respect of confidential journalistic material
Read More »Researchers create safer lithium-ion batteries that harden on impact
Lithium-ion batteries have a world of important applications (smartphones, electric vehicles and the Mars Curiosity Rover, to name a few), but they're also notoriously unstable, and if damaged can result in burns, house fires and even plane crashes....
Read More »NASA supports SpaceX plan to fuel rockets with astronauts on board
As SpaceX gears up to launch NASA astronauts to space with its Falcon 9 rockets, the agency has been debating whether to allow the company to fuel its spacecraft after astronauts have boarded. SpaceX typically fuels its rockets shortly before launch...
Read More »Remember the driver disguised as a car seat? That helped Ford develop a self-driving ‘language.’ – Mashable
Mashable Remember the driver disguised as a car seat? That helped Ford develop a self-driving 'language.' Mashable Sure enough, Ford is working on its "human machine interface," which includes a mobile app and a touchscreen and digital voice inside the car. Passengers will press a button on a screen when they are ready to go, it said. Information from the car will ... and more »
Read More »