Complex networks researchers at Indiana University have developed a tool that helps anyone determine whether a Twitter account is operated by a human or an automated software application known as a social bot. The new analysis tool stems from research at the IU Bloomington School of Informatics and Computing funded by the U.S. Department of Defense to counter technology-based misinformation and deception campaigns.
"We have applied a statistical learning framework to analyze Twitter data, but the ‘secret sauce’ is in the set of more than one thousand predictive features able to discriminate between human users and social bots, based on content and timing of their tweets, and the structure of their networks," said Alessandro Flammini, an associate professor of informatics and principal investigator on the project. "The demo that we’ve made available illustrates some of these features and how they contribute to the overall ‘bot or not’ score of a Twitter account.”
Showing 74 posts tagged security
Sometimes it feels like this.
Now’s a great day to change your tumblr password AND set up 2-factor authentication.
If you’re like me and you’ve never logged out of the tumblr iOS app - to do this:
- Go to your meeple icon (Account)
- Tap the sprocket (Settings)
After setting up 2-factor authentication, on the tumblr website, you can enable a mobile app login password to use instead of your real password. Be safe, and feel free to ask if you run into trouble!
This post follows one a few hours ago about the Heartbleed security failure, and for safety’s sake it repeats information I have added to that post as an update.
Should you take the latest security scare seriously? I do, and here is what I am doing about it.
A strong password:
Is at least eight characters long.
Does not contain your user name, real name, or company name.
Does not contain a complete word.
Is significantly different from previous passwords
- Contains uppercase, lowercase letters, numbers, and symbols (like !&$#)
Cyber Warfare Real Time Map
Interactive 3D visualisation displaying where malware is detected and from around the globe … with a slight cyberpunk aesthetic.
Try it out for yourself here
*Netscape’s web nineteen years later: web corporations encrypt themselves to annoy state surveillance entities, while Tor usages soars within locked-down, rebellious Turkey.
As a technology director, my job is not just to keep the servers up and the network running. My job is to support and enhance technology’s potential for teaching and learning. My job is to lay the groundwork for innovation and excellence in education. If I am not taking instructional needs into account when I make decisions that impact teachers and students, I am not doing my job.
You may have heard on the news about an ugly new “ransomware” bug that can infect your computer. This particular one is bad because many of the virus protection companies don’t have a fix out for it yet. (Currently, the fix is to pay the $300 to get your data back.)
Ways to minimize your risk at home:
- Keep your virus protection up-to-date (AVG / Mcafee / Norton – you should only have one installed! More is never better)
- Keep your computer updated (Windows / Apple)
- Check that you don’t have malware on your computer (Malwarebytes – free, works WITH virus protection)
- Be careful when searching for websites and clicking on links
- Install CCleaner and run it after every time you use the internet
- Don’t click on email spam/phishing links
- BACKUP the data/pictures/files you would be sad to lose using a flash drive, external hard drive, or cloud backup (Dropbox, Carbonite, or Mozy)
IF you want to read more: You’re infected – if you want to see your data again, pay us $300 in bitcoins / Cryptolocker FAQ
Yes, the iPhone fingerprint sensor can be “hacked.” No, you shouldn’t worry about it.
“Even if the attack proves to be real, this isn’t a casual, fast trick. The attacker would have to be lucky enough to get a perfect print of the correct finger to unlock the iPhone, which means they’d have to find that specific print, or be forced to try several fake prints. Anyone this intent on hacking your iPhone would need prolonged access to it.”
A suburban Los Angeles school district is now looking at the public postings on social media by middle and high school students, searching for possible violence, drug use, bullying, truancy and suicidal threats.
Though critics liken the monitoring to government stalking, school officials and their contractor say the purpose is student safety.
We have a new report out today on how internet users navigate anonymity, privacy, and security online.
One of the big findings in the report is that young adults ages 18-29 are more likely than their elders to take steps to be hidden online, as this chart shows. Other findings:
- 21% of internet users have had an email or social networking account compromised or taken over by someone else without permission.
- 12% have been stalked or harassed online.
- 11% have had important personal information stolen such as their Social Security Number, credit card, or bank account information.
- 6% have been the victim of an online scam and lost money.
- 6% have had their reputation damaged because of something that happened online.
- 4% have been led into physical danger because of something that happened online.
Fighting test cheating is an age-old battle, as shown by recent major scandals involving pencil-and-paper exams. But worries about hacking and other sophisticated forms of cheating, such as wirelessly transmitting questions outside of an exam room, has testing companies, test-security firms and academics rushing to develop measures to reduce or catch cheating. Companies plan to soon start selling security packages to school districts and licensing boards.