Connect with us

Technology

How to spot fake Russian social media accounts and posts

Published

on

How to spot fake Russian social media accounts and posts

NEWNow you can take heed to Fox Information articles!

Because the Russia-Ukraine Battle escalates, cable information rankings have skyrocketed. However take a look at what they’re exhibiting you: Social media posts and on-line influencers. 

There is no query the Ukraine invasion is a social media struggle — the world’s first. Many TV interviews are with Ukrainians who’re garnering massive social media followings. TikTok is stuffed with video clips of after bombing scenes and bomb shelters. They’re shot on smartphones by residents and shared straight with the world, bypassing conventional media retailers. 

Right here at dwelling, my connections within the cybersecurity world say cyberattacks are getting extra subtle and can goal companies and peculiar residents such as you and me. Faucet or click on right here for 5 issues it’s essential replace proper now, beginning along with your router

Advertisement

Amongst real posts and movies you’re sure to run into fakes, previous footage, and deceptive data. Right here’s find out how to spot the junk, so you do not unwittingly share it. 

Have a crucial eye 

Sharing is at all times one click on away on social media. Not many individuals take the time to analysis earlier than spreading an article, photograph, or video — particularly when it comes from a buddy or on-line character you belief.  

Russia’s propaganda machine is working at full throttle. Utilizing synthetic intelligence, Russia is creating pretend accounts of Ukrainians who supposedly agree with the invasion of their nation on Fb, Instagram, Telegram, and Twitter.  

A destroyed armored vehicle is seen in front of a school which, according to local residents, was on fire after shelling, as Russia's invasion of Ukraine continues, in Kharkiv, Ukraine, Feb. 28, 2022. 

A destroyed armored car is seen in entrance of a college which, in line with native residents, was on fireplace after shelling, as Russia’s invasion of Ukraine continues, in Kharkiv, Ukraine, Feb. 28, 2022. 
(REUTERS/Vitaliy Gnidyi)

These accounts say Ukraine is a “failed state,” and President Volodymyr Zelensky is “constructing a neo-Nazi dictatorship.” The accounts typically say the particular person works for a information group or represents some political motion in Ukraine to construct credibility. 

Advertisement

Need to see an instance? Meet Vladimir Bondarenko. 

NBC Information Senior Reporter Brian Collins found Vladimir Bondarenko and posted about him that, “He’s a blogger from Kiev who actually hates the Ukrainian authorities. He additionally doesn’t exist, in line with Fb. He’s an invention of a Russian troll farm concentrating on Ukraine. His face was made by AI.”  

 When you look intently at Vladimir Bondarenko’s face, there seems to be a chunk lacking out of the highest of his left ear. That’s the issue with AI. It typically misses the main points. 

Have you ever ever checked out a picture and had an eerie feeling that one thing was off? Take heed to your instinct. 

Are there landmarks or notable buildings in a photograph? What time of yr is it? Are you able to see any clocks or different indicators of time? 

Advertisement

It’s not simply repurposed photographs, both. In the present day’s deepfake expertise makes it comparatively straightforward to pretend absolutely anything. Faucet or click on for 10 Russia-Ukraine struggle scams and cons spreading proper now

Several buildings in Starobilsk within the Luhansk Oblast region of Ukraine show significant damage because of shelling, according to images shared by the State Emergency Service of Ukraine.

A number of buildings in Starobilsk inside the Luhansk Oblast area of Ukraine present important harm due to shelling, in line with pictures shared by the State Emergency Service of Ukraine.
(State Emergency Service of Ukraine)

Discover the primary use 

Previous pictures and movies are inclined to go viral throughout a battle, pure catastrophe, or emergency. Following the Russian invasion into Ukraine, a video of a dramatic explosion was shared tens of hundreds of instances. The footage was precise, but it surely confirmed the 2020 blast in Beirut. 

There are a couple of instruments that may provide help to spot recycled content material. Begin with Google Photos.  

You’ll be able to search the web utilizing a picture as an alternative of phrases. While you run a photograph by way of Google Photos, it’ll search and discover different pictures prefer it so you’ll be able to decide the photograph’s origin. It is going to additionally pull up modified and amended variations.  

  • To seek for a picture, you’ll be able to:
  • Drag the picture to the Google Photos search subject.
  • Copy the picture’s URL and paste it into the search engine.
  • Proper-click on any picture in Chrome and hit “Search Google for picture.”

TinEye.com is one other reverse picture search choice. Pictures are checked in opposition to its in-house index, containing over 52.6 billion pictures. 

Professional Tip: Are you normally scrolling social media or information websites in your cellphone? Faucet or click on for a couple of methods to do a reverse picture search out of your smartphone

Advertisement

Go on a fact-finding mission 

Whether or not you’re taking a look at photographs, movies, or simply textual content, the extra details you realize, the tougher you’re to idiot. The place do you have to begin? Many information organizations are dedicating sources to debunking phony viral content material. Right here’s a listing of truth checks accomplished by the Related Press

Unbiased teams are doing the identical. Bellingcat is “an impartial worldwide collective of researchers, investigators and citizen journalists” researching data spreading on the Russia-Ukraine Battle. Faucet or click on right here for a listing of Bellingcat’s fact-checked claims

Thousands of protesters supporting Ukraine gathered in Washington, D.C. and demanded the Biden administration provide more help

Hundreds of protesters supporting Ukraine gathered in Washington, D.C. and demanded the Biden administration present extra assist
(Fox Information Digital/Lisa Bennatan)

Metadata tells a narrative, too 

Not everybody who posts photographs or movies on-line realizes these information comprise lots of figuring out data. Are you giving freely greater than you notice? Faucet or click on to see how one can sleuth out particulars in your personal photographs or photographs saved to your pc or cellphone

When you run throughout a photograph and wish to know the place it got here from or when it was shot, use a web-based instrument to look at the metadata. Attempt exifdata or metapicz to see in case you can flip up any fascinating data. You’ll be able to take a look at metadata utilizing enhancing software program like Photoshop, too. 

One factor to notice is that social media websites typically strip out metadata to guard consumer privateness. Until a photograph is shared with you straight or by way of a messaging app, you will have extra luck utilizing Google Photos or TinEye. 

Advertisement

Report false and deceptive posts while you see them 

When you come throughout pretend pictures or deceptive posts, report them. Whether or not that’s Fb or a good information web site, take the time to level out that the knowledge is wrong. 

With pretend pictures comes false data, and that may trigger critical issues. Do your half to discern truth from fiction early and infrequently. 

Bonus Tip: Ukraine Battle: The risks, scams and hacks it’s essential look ahead to + your calls 

Russia has invaded Ukraine and there are fears it might result in cyber warfare — even right here within the U.S. Discover out what it might imply for you. Plus, 10 new struggle cons scammers are utilizing to idiot individuals. 

Try my podcast “Kim Komando Explains” on Apple, Google Podcasts, Spotify, or your favourite podcast participant. 

Advertisement

Take heed to the podcast right here or wherever you get your podcasts. Simply seek for my final title, “Komando.” 

What digital life-style questions do you will have? Name Kim’s nationwide radio present and faucet or click on right here to search out it in your native radio station. You’ll be able to take heed to or watch The Kim Komando Present in your cellphone, pill, tv, or pc. Or faucet or click on right here for Kim’s free podcasts. 

Copyright 2022, WestStar Multimedia Leisure. All rights reserved. By clicking the procuring hyperlinks, you’re supporting my analysis. As an Amazon Affiliate, I earn a small fee from qualifying purchases. I solely advocate merchandise I consider in. 

Find out about all the most recent expertise on The Kim Komando Present, the nation’s largest weekend radio discuss present. Kim takes calls and dispenses recommendation on at the moment’s digital life-style, from smartphones and tablets to on-line privateness and information hacks. For her every day ideas, free newsletters, and extra, go to her web site at Komando.com.  

Advertisement
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

This digital D&D watch lets you roll a fireball from your wrist

Published

on

This digital D&D watch lets you roll a fireball from your wrist

Dice hoarding is a common hobby among Dungeons and Dragons players, but I’m betting most won’t have a digital watch in their collection. Alongside displaying the time, day, and date, the Timestop D-20 includes all the dice-rolling features you need to play tabletop roleplaying games directly from your wrist at the push of a button.

The watch allows the wearer to digitally roll a 4-, 6-, 8-, 10-, 12-, 20-, or 100-sided dice, alongside “Advanced Combat” features such as rolling up to 12 dice at once, and D20s with advantage or disadvantage (a fancy way of rolling two dice and taking either the higher or lower results). It’ll also display specific icons when a D20 rolls a 1 or a 20 — known as a “critical failure” or “critical success” respectively in D&D.

“We wanted a fun animation while rolling, but also an overall subdued look so you could ‘take the game with you’ and even wear the watch at the office,” Timestop says in its blog describing the design process. “We included day and date complications with a perpetual calendar so it was still a practical timepiece.”

Pricing starts at $99 and is available in three colors: black, orange, and stainless steel. Shipping starts next year, with stock available for delivery in either January or February. 

One feature you won’t find on the Timestop D-20 is an alarm, because alarms “aren’t fun,” according to its creator. Otherwise, it’s water-resistant, features a backlit LCD display, and uses a replaceable coin cell battery that can last up to three years with “typical use.” I’m not sure how many fireball spells would be considered typical, but it certainly offers a more unique way to play than traditional dice or digital dice-rolling apps.

Advertisement
Continue Reading

Technology

Honda has a plan to build solid-state batteries for EVs

Published

on

Honda has a plan to build solid-state batteries for EVs

Honda set up a demonstration facility in Japan to show off its plans to mass-produce solid-state batteries at lower costs, which could be crucial to unlocking higher-range, longer-lasting electric vehicles for the future.

Solid-state batteries have been elusive for many companies due to the complexity of scaling up production. The technology swaps out the liquid electrolytes found in current lithium-ion batteries with dry conductive materials, promising higher energy density and longer lifespans. But it will require a whole new production process to be successful.

Roll pressing of cathode for solid-state batteries.
Image: Honda

Honda says it is accelerating research at its new 27,000 square-meter demo facility set up in Sakura City, Japan, and is shortening the time required to make a single unit. The site has full-scale equipment that is split between three buildings: the first for cathode formation and cell assembly; the second for anode formation; and the third for electrolyte activation and module assembly.

The plan includes using a continuous inline mixer that Honda says is “three times faster” than typical cell batch processing. Honda plans to make batteries on this line in January.

Advertisement

Honda is readying its solid-state tech for mass production in the second half of the 2020s. The company’s CEO Toshihiro Mibe has eluded that solid-state batteries will also be the key to unlocking cheaper EVs.

Continue Reading

Technology

How your browser is spying on you: Hidden dangers lurking behind every click

Published

on

How your browser is spying on you: Hidden dangers lurking behind every click

A browser is one of the most popular apps we use. It’s the gateway between the internet and its users, translating raw code into something we perceive as a web page and allowing us to interact with the web. It’s safe to say that anyone who uses the internet uses a web browser. 

But while this tool is extremely useful, it can also be equally dangerous. For example, clicking malicious links can redirect you to harmful websites that either steal personal information or infect your device with malware.

If you use a search engine like Google through Chrome, it can collect data on your searches, browsing history and even your location (if location services are enabled). Most browsers also use cookies, small files that store information about your online behavior. Let’s discuss the risks associated with web browsers and how to stay safe.

I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS

A person conducting a Google search on their laptop (Kurt “CyberGuy” Knutsson)

Advertisement

How a browser doubles as spyware

Browsers are much more than simple tools to navigate the web. They are, in many ways, tools for surveillance. While they help you access websites and services, they also track your every move online to feed the ever-hungry advertising industry.

First off, most browsers collect data about your searches, browsing habits and even your location. This data isn’t just stored to “improve your experience,” it’s used to create a detailed profile of you, which is then shared with advertisers who target you with personalized ads. 

Google Chrome, for example, is notorious for tracking your activity. As you browse, it feeds data to Google’s advertising engine, allowing it to serve highly targeted ads based on your behavior. This includes everything from your search history to the websites you visit, even down to the smallest detail, like how long you stay on a page​.

“Google may share information about you with advertisers, business partners, sponsors, and other third parties,” Google boldly mentions on its privacy policy page.

Browsers also use cookies to keep tabs on you. These cookies track your activity across different sites, even after you’ve left a site. This means that ads you saw on one website might follow you across others, creating a persistent digital footprint. And while cookies can be blocked or deleted, many websites rely on them to function, making it hard to escape this kind of tracking.

Advertisement
another google browser

Google browser (Kurt “CyberGuy” Knutsson)

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Even Incognito mode isn’t safe

Even if you’re using privacy-focused browsers or tools like Incognito mode, they don’t really guarantee privacy. A 2020 class-action lawsuit revealed that Google kept scraping searches by gathering data from users browsing in Incognito through ad tools used by websites, picking up “potentially embarrassing” searches from millions of people. Google then used that data to track web traffic and sell ads.

It’s not just Google. Your internet service provider, the websites you visit and even governments can monitor your browsing activity, even in Incognito mode. All it does is hide your activity from your local browser history.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

laptop

A person conducting a Google search on their laptop (Kurt “CyberGuy” Knutsson)

TOP 6 HIDDEN WAYS A VPN CAN SAVE YOU MONEY NOW

Advertisement

How to protect your privacy 

As you all know, web browsers are essential tools for accessing the internet, but many popular options compromise your privacy by collecting extensive data. While Google Chrome is widely used, it tracks significant amounts of user information to power targeted advertising. However, there are several privacy-focused browser alternatives that prioritize user data protection. Also, to enhance your online security and protect your personal information, consider implementing these essential cybersecurity practices.

Keep software updated: Regularly update your operating system, browsers and other software to patch security vulnerabilities. Enable automatic updates whenever possible to ensure you’re always protected against the latest threats.

Use strong, unique passwords: Create complex passwords for each of your accounts and avoid reusing them. Consider using a password manager to generate and securely store strong passwords.

Enable two-factor authentication (2FA): Activate 2FA on all accounts that offer it. This adds an extra layer of security by requiring a second form of verification beyond your password.

Advertisement

Be cautious with emails and links: Avoid opening suspicious emails or clicking on unknown links. These could be phishing attempts designed to steal your information or infect your device with malware. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Use secure networks: When using public Wi-Fi, connect through a VPN to encrypt your internet traffic. For sensitive transactions, stick to secure, private networks.

Be mindful of social media sharing: Limit the personal information you share on social media platforms and adjust your privacy settings to control who can view your posts.

VPN: Your first line of defense against browser spying: A VPN (virtual private network) encrypts your internet connection, making it difficult for anyone, including your browser, to track your online activities. By masking your IP address and routing your traffic through secure servers, a VPN not only protects your personal data from prying eyes but also helps you avoid targeted advertising and potential data breaches.

Regardless of whether you are new to VPNs or not, you’ll want to choose trusted VPN providers known for robust encryption and no-log policies to ensure your privacy. Whether for sensitive tasks or everyday use, reputable VPN services will boost both your security and speed. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

Advertisement

By implementing these security practices and using privacy-focused browsers, you can significantly enhance your online safety and protect your personal data while browsing the web. Remember, cybersecurity is an ongoing process that requires vigilance and regular updates to your practices.

WHY YOU SHOULD BE USING A VPN TO SAFEGUARD YOUR STOCK TRADING ACTIVITIES

Kurt’s key takeaway

The web browser is an essential tool for accessing the internet, but it also opens the door to a host of privacy and security risks. Whether it’s being tracked for ads, snooped on by your ISP or accidentally stumbling onto a malware-filled site, the risks are everywhere. Tools like Incognito mode or cookie-blocking can help a bit, but they’re not enough to truly protect you. If you’re serious about staying private and secure, you need to up your game. Use a VPN, be cautious about what you click on and stay informed about the ways your browser might be working against you.

Do you think companies have gone too far with tracking? Let us know by writing us at Cyberguy.com/Contact.

Advertisement

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Advertisement

KURT’S HOLIDAY GIFT GUIDES

Unbeatable Best Black Friday deals 

Best gifts for MenWomenKidsTeensPet lovers 

Best deals: LaptopsDesktops

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Continue Reading

Trending