Facebook gives moderators “full access” to user accounts suspected of terror links

Big problem: Facebook and others have refused to define what “terrorism” is.
By Zack Whittaker for Zero Day | June 29, 2017 — 18:15 GMT (11:15 PDT) | Topic: Security

Facebook has a fleet of low-paid contractors who are tasked with investigating possible connections with terrorism on it site.

The key takeaway: Moderators are granted “full access” to any account once it’s been flagged by the social network’s algorithms, which are looking for details or connections that might suggest a terror link. Moderators can track track a person’s location and read their private messages.

The news comes from The Guardian, just days after Facebook chief executive Mark Zuckerberg announced the social network now has two billion users.

“The counter-terrorism unit has special clearance to carry out investigations into user accounts if they are suspected of having links to terrorist groups identified by the US State Department,” says the report. “Moderators will then access the individual’s private messages, see who they are talking to and what they are saying, and view where they have been.”

The move appears to go far above and beyond the company’s recently outlined efforts to use its artificial intelligence and human resources to counter terrorism on the platform. It’s in response to growing pressure from several countries to act and to battle terrorism on their platforms, in the wake of several terror attacks in the UK and Europe.

READ MORE: http://www.zdnet.com/article/facebook-gives-moderators-full-access-to-accounts-to-anyone-suspected-of-terror-links/

IDShield is the answer!

Another massive ransomware attack hitting businesses from banks to utilities and it’s spreading worldwide!

Another massive ransomware attack hitting businesses from banks to utilities and it’s spreading worldwide!
June 27,2017
By Mark Jones, Komando.com



We’ve been warning you that ransomware attacks have been getting worse for quite some time now. In May, the nastiest variant ever discovered, dubbed WannaCry, infected hundreds of thousands of computers worldwide.

Another massive global cyberattack is happening right now. And this one seems to be much worse than WannaCry.

What’s the latest global cyberattack?
The latest massive cyberattack started spreading across the globe on Tuesday. It’s a ransomware attack being dubbed GoldenEye, which is thought to be a variant of Petya ransomware.

GoldenEye was first discovered in Ukraine, but it has since spread to countries around the world. Companies in the U.S., U.K., France, Norway and Denmark have all been affected. A radiation monitoring system was even affected in Chernobyl. Scary!

The attack has hit Ukraine extremely hard. Its power grid, airport, and national bank have all been compromised. Flight delays are expected because of the attack.

Ukraine’s deputy prime minister said on Twitter that, “all computers of the government had fallen victim to the virus.” He also posted a picture of his locked computer.

READ MORE: https://www.komando.com/happening-now/405973/another-massive-ransomware-attack-hitting-businesses-from-banks-to-utilities-and-its-spreading-worldwide

IDShield is the answer!

THOUGHT FOR TODAY – 06/21/2017

“Aaah, summer – that long anticipated stretch of lazy, lingering days, free of responsibility and rife with possibility. It’s a time to hunt for insects, master handstands, practice swimming strokes, conquer trees, explore nooks and crannies, and make new friends.”
― Darell Hammond

Watch out for fake ads promising $10 billion settlement payout

By Mark Jones, Komando.com, June 19, 2017

What’s the latest scam making the rounds?
We’re talking about misleading ads popping up online and on social media sites. The ads claim that you could be eligible to receive monthly payments from the Tobacco Master Settlement Agreement (MSA) of 1998.

The MSA was a settlement for a lawsuit brought by 46 states in the U.S. against the tobacco industry. The agreement requires tobacco companies to pay roughly $10 billion annually to the 46 states and the District of Columbia perpetually.

The misleading ads seem to be targeting retirees and claim to offer individuals a “tax-free portion of this settlement.” Consumers are told they are guaranteed to receive $2,300 every month, tax-free, forever.

Warning! These ads are a scam.

READ MORE: http://www.komando.com/happening-now/404925/watch-out-for-fake-ads-promising-10-billion-settlement-payout

IDShield is the answer!

198 million Americans hit by “largest ever” voter records leak

Personal data on 198 million voters, including analytics data that suggests who a person is likely to vote for and why, was stored on an unsecured Amazon server.
By Zack Whittaker for Zero Day | June 19, 2017 — 13:00 GMT (06:00 PDT) | Topic: Security

A huge trove of voter data, including personal information and voter profiling data on what’s thought to be every registered US voter dating back more than a decade, has been found on an exposed and unsecured server, ZDNet has learned.

It’s believed to be the largest ever known exposure of voter information to date.

The various databases containing 198 million records on American voters from all political parties were found stored on an open Amazon S3 storage server owned by a Republican data analytics firm, Deep Root Analytics.

UpGuard cyber risk analyst Chris Vickery, who found the exposed server, verified the data. Through his responsible disclosure, the server was secured late last week, and prior to publication.

READ MORE: http://www.zdnet.com/article/security-lapse-exposes-198-million-united-states-voter-records/

IDShield is the answer!

PayPal Phishing Site Asks Victims to Submit a Selfie Holding Their ID Card

By Catalin Cimpanu
June 15, 2017 06:50 PM 5

A PayPal phishing campaign is luring victims to a hacked site where a clone of the PayPal login page is trying to trick users into giving away their PayPal credentials, payment card details, and … a selfie of the user holding his ID card.

Brought to Bleeping Computer’s attention by security researchers from PhishMe, the crook behind this operation relies on spam emails to drive users toward a PayPal phishing page hosted on a compromised WordPress site from New Zealand.

At the time of writing, the phishing page had been removed, but following a classic pattern for phishing sites, users arriving on this page were asked to log in with their PayPal credentials.

There was no attempt to spoof the browser URL, so if users had any kind of experience with phishing pages, they would have immediately noticed they were on a page with the wrong address.

READ MORE: https://www.bleepingcomputer.com/news/security/paypal-phishing-site-asks-victims-to-submit-a-selfie-holding-their-id-card/

Everyone needs IDShield!