Twitter Fingers May Be Sharing News Story Links but That Does Not Mean Anyone Read the Article

December 14, 2016

The article on ScienceDaily titled New Study Highlights Power of Crowd to Transmit News on Twitter shows that Twitter is, in fact, good at something. That something is driving recommendations of news stories. A study executed by Columbia University and the French National Institute found that the vast majority of clicks on news stories is based on reader referrals. The article details the findings:

Though far more readers viewed the links news outlets promoted directly on Twitter… most of what readers shared and read was crowd-curated. Eighty-two percent of shares, and 61 percent of clicks, of the tweets in the study sample referred to content readers found on their own. But the crowd’s relative influence varied by outlet; 85 percent of clicks on tweets tied to a BBC story came from reader recommendations while only 10 percent of tweets tied to a Fox story did.

It will come as no shock that people are getting a lot more of their news through social media, but the study also suggests that people are often sharing stories without reading them at all. Indeed, one of the scientists stated that the correlation between likes, shares, and actual reads is very low. The problem inherent in this system is that readers will inevitably only look at content that they already agree with in a news loop that results in an even less informed public with even more information at their fingertips than ever before. Thanks Twitter.

Chelsea Kerwin, December 14, 2016

Ten Search Engines That Are Not Google

December 13, 2016

Business-design firm Vandelay Design shares their 10 favorite alternatives to Google Search in their blog post titled, “Alternative Search Engines for Designers and Developers.” Naturally, writer Jake Rocheleau views these resources from a designer’s point of view, but don’t let that stop you from checking out the list. The article states:

New intriguing search engines frequently pop up as a replacement to the juggernaut that is Google. But it’s tough to find alternative search engines that actually work and provide real value to your workflow. I’d like to cover a handful of alternatives that work well for designers and developers. These aren’t all web crawler search engines because I did throw in a few obscure choices for design resources too. But the sites in this list may be better replacements for Google no matter what you’re searching for. …

All 10 of these search engines are viable choices to add into your workflow, or even replace existing sites you already use. Designers are always looking for new tools and I think these sites fit the bill.

Rocheleau describes his selections and gives tips for getting the most out of each. He leads with DuckDuckGo—come for the privacy, stay for the easter eggs. StartPage also promises privacy as it pulls results from other search engines. Designers will like Instant Logo Search, for locating SVG vector logos, and Vecteezy for free vector designs. Similarly, Iconfinder and DryIcons both offer collections of free icons.

For something a little different, try The WayBack Machine at the Internet Archive, where you can comb the archives for any previously existing domain. Rocheleau suggests designers use it to research competitors and gain inspiration, but surely anyone can find interesting artifacts here.

We are reminded that one can get a lot from WolframAlpha if one bothers learning to use it. Then there is Ecosia, which uses ad revenue to plant trees across the globe. (They have planted over four million trees since the site launched in December of 2009.) The final entry is Qwant, another engine that promises privacy, but also offers individual search features for categories like news, social-media channels, and shopping. For anyone tired of Google and Bing, even non-designers, this list points the way to several good alternatives.

Cynthia Murrell, December 13, 2016

Google Aims to Try Social Media Again with YouTube

December 12, 2016

One of the biggest problems that Google faced in social media was that it was trying to compete against Facebook.  Ever hear the saying, “don’t fix it, if it is not broke?” It is not that Google was trying to fix Facebook, but it was trying to offer a solution to something that was not broken to begin with.  What was broken?  We are still trying to figure that out, but rest assured it was more than likely Google selling a Facebook knockoff.

Google, however, already owns one of the largest social media Web sites, if not the most popular: YouTube.  Google might open a new section of YouTube called Backstage that allows users to communicate, share links, share links, videos, and polls.  Does that not already sound like Facebook?

There is more:

Backstage will introduce new types of posts to YouTube. Google plans to differentiate between regular videos and Backstage videos. The latter allows channels to push videos only to subscribers and not to users discovering the channel through search or other means.  Backstage is an internal project currently and it is unclear if and when it will be made available. While YouTube is highly popular when it comes to video publishing and watching, it lacks in the social department. While users may post comments under videos or channels, there is little in terms of communication going elsewhere.

People already socialize on YouTube through the comments section.  Backstage might simply add more order to an already chaotic comments block.

Whitney Grace, December 12, 2016

When Censorship Means More Money, Facebook Leans In

December 8, 2016

The article on Vanity Fair titled Facebook Is Reportedly Building a Censorship Tool to Win Over China suggests that the people nervous about what it will mean to address the fake news proliferation are correct. The fear that Facebook managing fake news stories might lead to actual censorship of the news is not so far-fetched after all. The article states,

Auditing fake news is considered to be a slippery-slope problem for the company, which is just now starting to use fact-checkers to “grade” the veracity of news stories shared on its Web site and to crack down on false or partially false news stories shared on Facebook. Still, beneath it all, Facebook remains a publicly traded company with a fiduciary duty to its shareholders—and that duty is to make money.

Zuckerberg’s interest in capturing China’s 700M+ internet users has led to the creation of a censorship tool that can “automatically suppress content in specific geographic areas.” The tool has not been implemented (yet), but it suggests that Zuckerberg has a flexible relationship with freedom of information, especially where money is at stake. And there is a lot of money at stake. The article delves into the confusion over whether Facebook is a media company or not. But whatever type of company it is, it is a company. And that means money comes first.

Chelsea Kerwin, December 8, 2016

Tor Comes to the Rescue of Turkish Online Activists

November 29, 2016

Authorities in Turkey have effectively banned the use of social media platforms like Facebook, Twitter, and YouTube. Tor, however, has to come to the rescue of users, particularly online activists who want to get the word out about the social unrest in the country.

Motherboard in a report tiled Turks Are Flocking to Tor After Government Orders Block of Anti-Censorship Tools says:

Turkish Internet users are flocking to Tor, the anonymizing and censorship circumvention tool, after Turkey’s government blocked Twitter, Facebook, and YouTube. Usage of Tor inside of Turkey went up from around 18,000 users to 25,000 users on Friday, when the government started blocking the popular social media networks, according to Tor’s official metrics.

Apart from direct connection to the Tor Network through TOR browser, the network also allows users to use bridge relays that circumvent any access restrictions by ISPs. Though it’s not yet clear if ISPs in Turkey have also banned Tor access; however, the bridge relay connections have seen a spike in number since the ban was implemented.

It is speculated that the Government may have notified ISPs to ban Tor access, but failed to tell them to do so effectively, which becomes apparent here (a Tweet by a user):

I believe the government just sent the order and didn’t give any guide about how to do it,” Sabanc? told Motherboard in an online chat via Twitter. “And now ISPs trying to figure it out.

This is not the first time Tor has come to the rescue of online activists. One thing though is sure, more and more people concerned about their privacy or do not want to be repressed turning towards anonymous networks like Tor.

Vishal Ingole, November 29, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

AI to Profile Gang Members on Twitter

November 16, 2016

Researchers from Ohio Center of Excellence in Knowledge-enabled Computing (Kno.e.sis) are claiming that an algorithm developed by them is capable of identifying gang members on Twitter.

Vice.com recently published an article titled Researchers Claim AI Can Identify Gang Members on Twitter, which claims that:

A deep learning AI algorithm that can identify street gang members based solely on their Twitter posts, and with 77 percent accuracy.

The article then points out the shortcomings of the algorithm or AI by saying this:

According to one expert contacted by Motherboard, this technology has serious shortcomings that might end up doing more harm than good, especially if a computer pegs someone as a gang member just because they use certain words, enjoy rap, or frequently use certain emojis—all criteria employed by this experimental AI.

The shortcomings do not end here. The data on Twitter is being analyzed in a silo. For example, let us assume that few gang members are identified using the algorithm (remember, no location information is taken into consideration by the AI), what next?

Is it not necessary then to also identify other social media profiles of the supposed gang members, look at Big Data generated by them, analyze their communication patterns and then form some conclusion? Unfortunately, none of this is done by the AI. It, in fact, would be a mammoth task to extrapolate data from multiple sources just to identify people with certain traits.

And most importantly, what if the AI is put in place, and someone just for the sake of fun projects an innocent person as a gang member? As rightly pointed out in the article – machines trained on prejudiced data tend to reproduce those same, very human, prejudices.

Vishal Ingole, November  16, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Americans Are Complacent About Online Data Breaches

November 1, 2016

Users of email, social networks, and other online services are aware of possible dangers that data breaches cause, but surprisingly are less concerned about it in 2016, a survey reveals.

Observer recently published a report titled Fears of the Web’s Dark Side—Strangely—Are Not Growing, which reveals:

People’s fears about their email being hacked have receded somewhat since 2014, bizarrely. Across the 1,071 Americans surveyed, that particular worry receded from 69 to 71 percent.

The survey commissioned by Craigconnects also reveals that online users are no longer very concerned about their data getting leaked online that may be used for identity theft; despite large scale breaches like Ashley Madison. Users, as the survey points out have accepted it as a trade-off for the convenience of Internet.

The reason for the complacency setting in probably lies in the fact that people have realized:

The business of social media company is built upon gathering as much information as possible about users and using that information to sell ads,” Michael W. Wellman, CEO of Virgil Security wrote the Observer in an email. “If the service is free, it’s the user that’s being sold.

Nearly 7 percent Americans are victims of identity theft. This, however, has not dissuaded them from taking precautionary measures to protect their identity online. Most users are aware that identity theft can be used for stealing money from bank accounts, but there are other dangers as well. For instance, prescription medication can be obtained legally using details of an identity theft victim. And then there are uses of the stolen data that only Dark Web actors know where such data of millions of victims is available for few hundred dollars.

Vishal Ingole November 1, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Posting to the Law Enforcement Database

October 28, 2016

The article titled Police Searches of Social Media Face Privacy Pushback on Underground Network discusses the revelations of an NPR article of the same name. While privacy laws are slow to catch up to the fast-paced changes in social media, law enforcement can use public data to track protesters (including retroactive tracking). The ACLU and social media networks are starting to push back against the notion that this is acceptable. The NPR article refers to the Twitter guidelines,

The guidelines bar search companies from allowing law enforcement agencies to use the data to “investigate, track or surveil Twitter’s users (…) in a manner that would require a subpoena, court order, or other valid legal process or that would otherwise have the potential to be inconsistent with our users’ reasonable expectations of privacy.” But that policy is very much open to interpretation, because police don’t usually need legal orders to search public social media…

Some police departments have acknowledged that fuzziness around privacy laws puts the onus on them to police their own officers. The Dunwoody, Georgia police department requires supervisor approval for social media searches. They explain that this is to prevent targeting “particular groups” of people. According to the article, how this issue unfolds is largely up to police departments and social media giants like Twitter and Facebook to decide. But social media has been around for over a decade. Where are the laws defining and protecting our privacy?

Chelsea Kerwin, October 28, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Trending Topics: Google and Twitter Compared

October 25, 2016

For those with no time to browse through the headlines, tools that aggregate trending topics can provide a cursory way to keep up with the news. The blog post from communications firm Cision, “How to Find Trending Topics Like an Expert,” examines the two leading trending topic tools—Google’s and Twitter’s. Each approaches its tasks differently, so the best choice depends on the user’s needs.

Though the Google Trends homepage is limited, according to writer Jim Dougherty, one can get further with its extension, Google Explore. He elaborates:

If we go to the Google Trends Explore page (google.com/trends/explore), our sorting options become more robust. We can sort by the following criteria:

*By country (or worldwide)

*By time (search within a customized date range – minimum: past hour, maximum: since 2004)

*By category (arts and entertainment, sports, health, et cetera)

*By Google Property (web search, image search, news search, Google Shopping, YouTube)

You can also use the search feature via the trends page or explore the page to search the popularity of a search term over a period (custom date ranges are permitted), and you can compare the popularity of search terms using this feature as well. The Explore page also allows you to download any chart to a .csv file, or to embed the table directly to a website.

The write-up goes on to note that there are no robust third-party tools to parse data found with Google Trends/ Explore, because the company has not made the API publicly available.

Unlike Google, we’re told, Twitter does not make it intuitive to find and analyze trending topics. However, its inclusion of location data can make Twitter a valuable source for this information, if you know how to find it. Dougherty suggests a work-around:

To ‘analyze’ current trends on the native Twitter app, you have to go to the ‘home’ page. In the lower left of the home page you’ll see ‘trending topics’ and immediately below that a ‘change’ button which allows you to modify the location of your search.

Location is a huge advantage of Twitter trends compared to Google: Although Google’s data is more robust and accessible in general, it can only be parsed by country. Twitter uses Yahoo’s GeoPlanet infrastructure for its location data so that it can be exercised at a much more granular level than Google Trends.

Since Twitter does publicly share its trending-topics API, there are third-party tools one can use with Twitter Trends, like TrendoGate, TrendsMap, and ttHistory. The post concludes with a reminder to maximize the usefulness of data with tools that “go beyond trends,” like (unsurprisingly) the monitoring software offered by Daugherty’s company. Paid add-ons may be worth it for some enterprises, but we recommend you check out what is freely available first.

Cynthia Murrell, October 25, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Half of the Largest Companies: Threat Vulnerable

October 24, 2016

Compromised Credentials, a research report by Digital Shadows reveals that around 1,000 companies comprising of Forbes Global 2000 are at risk as credentials of their employees are leaked or compromised.

As reported by Channel EMEA in Digital Shadows Global Study Reveals UAE Tops List in Middle East for…

The report found that 97 percent of those 1000 of the Forbes Global 2000 companies, spanning all businesses sectors and geographical regions, had leaked credentials publicly available online, many of them from third-party breaches.

Owing to large-scale data breaches in recent times, credentials of 5.5 million employees are available in public domain for anyone to see. Social networks like LinkedINMySpace and Tumblr were the affliction points of these breaches, the report states.

Analyzed geographically, companies in Middle-East seem to be the most affected:

The report revealed that the most affected country in the Middle East – with over 15,000 leaked credentials was the UAE. Saudi Arabia (3360), Kuwait (203) followed by Qatar (99) made up the rest of the list. This figure is relatively small as compared to the global figure due to the lower percentage of organizations that reside in the Middle East.

Affected organizations may not be able to contain the damages by simply resetting the passwords of the employees. It also needs to be seen if the information available is contemporary, not reposted and is unique. Moreover, mere password resetting can cause lot of friction within the IT departments of the organizations.

Without proper analysis, it will be difficult for the affected companies to gauge the extent of the damage. But considering the PR nightmare it leads to, will these companies come forward and acknowledge the breaches?

Vishal Ingole, October 24, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Next Page »

  • Archives

  • Recent Posts

  • Meta