Connect with us

Technology

How to spot fake Russian social media accounts and posts

Published

on

How to spot fake Russian social media accounts and posts

NEWNow you can take heed to Fox Information articles!

Because the Russia-Ukraine Battle escalates, cable information rankings have skyrocketed. However take a look at what they’re exhibiting you: Social media posts and on-line influencers. 

There is no query the Ukraine invasion is a social media struggle — the world’s first. Many TV interviews are with Ukrainians who’re garnering massive social media followings. TikTok is stuffed with video clips of after bombing scenes and bomb shelters. They’re shot on smartphones by residents and shared straight with the world, bypassing conventional media retailers. 

Right here at dwelling, my connections within the cybersecurity world say cyberattacks are getting extra subtle and can goal companies and peculiar residents such as you and me. Faucet or click on right here for 5 issues it’s essential replace proper now, beginning along with your router

Advertisement

Amongst real posts and movies you’re sure to run into fakes, previous footage, and deceptive data. Right here’s find out how to spot the junk, so you do not unwittingly share it. 

Have a crucial eye 

Sharing is at all times one click on away on social media. Not many individuals take the time to analysis earlier than spreading an article, photograph, or video — particularly when it comes from a buddy or on-line character you belief.  

Russia’s propaganda machine is working at full throttle. Utilizing synthetic intelligence, Russia is creating pretend accounts of Ukrainians who supposedly agree with the invasion of their nation on Fb, Instagram, Telegram, and Twitter.  

A destroyed armored vehicle is seen in front of a school which, according to local residents, was on fire after shelling, as Russia's invasion of Ukraine continues, in Kharkiv, Ukraine, Feb. 28, 2022. 

A destroyed armored car is seen in entrance of a college which, in line with native residents, was on fireplace after shelling, as Russia’s invasion of Ukraine continues, in Kharkiv, Ukraine, Feb. 28, 2022. 
(REUTERS/Vitaliy Gnidyi)

These accounts say Ukraine is a “failed state,” and President Volodymyr Zelensky is “constructing a neo-Nazi dictatorship.” The accounts typically say the particular person works for a information group or represents some political motion in Ukraine to construct credibility. 

Advertisement

Need to see an instance? Meet Vladimir Bondarenko. 

NBC Information Senior Reporter Brian Collins found Vladimir Bondarenko and posted about him that, “He’s a blogger from Kiev who actually hates the Ukrainian authorities. He additionally doesn’t exist, in line with Fb. He’s an invention of a Russian troll farm concentrating on Ukraine. His face was made by AI.”  

 When you look intently at Vladimir Bondarenko’s face, there seems to be a chunk lacking out of the highest of his left ear. That’s the issue with AI. It typically misses the main points. 

Have you ever ever checked out a picture and had an eerie feeling that one thing was off? Take heed to your instinct. 

Are there landmarks or notable buildings in a photograph? What time of yr is it? Are you able to see any clocks or different indicators of time? 

Advertisement

It’s not simply repurposed photographs, both. In the present day’s deepfake expertise makes it comparatively straightforward to pretend absolutely anything. Faucet or click on for 10 Russia-Ukraine struggle scams and cons spreading proper now

Several buildings in Starobilsk within the Luhansk Oblast region of Ukraine show significant damage because of shelling, according to images shared by the State Emergency Service of Ukraine.

A number of buildings in Starobilsk inside the Luhansk Oblast area of Ukraine present important harm due to shelling, in line with pictures shared by the State Emergency Service of Ukraine.
(State Emergency Service of Ukraine)

Discover the primary use 

Previous pictures and movies are inclined to go viral throughout a battle, pure catastrophe, or emergency. Following the Russian invasion into Ukraine, a video of a dramatic explosion was shared tens of hundreds of instances. The footage was precise, but it surely confirmed the 2020 blast in Beirut. 

There are a couple of instruments that may provide help to spot recycled content material. Begin with Google Photos.  

You’ll be able to search the web utilizing a picture as an alternative of phrases. While you run a photograph by way of Google Photos, it’ll search and discover different pictures prefer it so you’ll be able to decide the photograph’s origin. It is going to additionally pull up modified and amended variations.  

  • To seek for a picture, you’ll be able to:
  • Drag the picture to the Google Photos search subject.
  • Copy the picture’s URL and paste it into the search engine.
  • Proper-click on any picture in Chrome and hit “Search Google for picture.”

TinEye.com is one other reverse picture search choice. Pictures are checked in opposition to its in-house index, containing over 52.6 billion pictures. 

Professional Tip: Are you normally scrolling social media or information websites in your cellphone? Faucet or click on for a couple of methods to do a reverse picture search out of your smartphone

Advertisement

Go on a fact-finding mission 

Whether or not you’re taking a look at photographs, movies, or simply textual content, the extra details you realize, the tougher you’re to idiot. The place do you have to begin? Many information organizations are dedicating sources to debunking phony viral content material. Right here’s a listing of truth checks accomplished by the Related Press

Unbiased teams are doing the identical. Bellingcat is “an impartial worldwide collective of researchers, investigators and citizen journalists” researching data spreading on the Russia-Ukraine Battle. Faucet or click on right here for a listing of Bellingcat’s fact-checked claims

Thousands of protesters supporting Ukraine gathered in Washington, D.C. and demanded the Biden administration provide more help

Hundreds of protesters supporting Ukraine gathered in Washington, D.C. and demanded the Biden administration present extra assist
(Fox Information Digital/Lisa Bennatan)

Metadata tells a narrative, too 

Not everybody who posts photographs or movies on-line realizes these information comprise lots of figuring out data. Are you giving freely greater than you notice? Faucet or click on to see how one can sleuth out particulars in your personal photographs or photographs saved to your pc or cellphone

When you run throughout a photograph and wish to know the place it got here from or when it was shot, use a web-based instrument to look at the metadata. Attempt exifdata or metapicz to see in case you can flip up any fascinating data. You’ll be able to take a look at metadata utilizing enhancing software program like Photoshop, too. 

One factor to notice is that social media websites typically strip out metadata to guard consumer privateness. Until a photograph is shared with you straight or by way of a messaging app, you will have extra luck utilizing Google Photos or TinEye. 

Advertisement

Report false and deceptive posts while you see them 

When you come throughout pretend pictures or deceptive posts, report them. Whether or not that’s Fb or a good information web site, take the time to level out that the knowledge is wrong. 

With pretend pictures comes false data, and that may trigger critical issues. Do your half to discern truth from fiction early and infrequently. 

Bonus Tip: Ukraine Battle: The risks, scams and hacks it’s essential look ahead to + your calls 

Russia has invaded Ukraine and there are fears it might result in cyber warfare — even right here within the U.S. Discover out what it might imply for you. Plus, 10 new struggle cons scammers are utilizing to idiot individuals. 

Try my podcast “Kim Komando Explains” on Apple, Google Podcasts, Spotify, or your favourite podcast participant. 

Advertisement

Take heed to the podcast right here or wherever you get your podcasts. Simply seek for my final title, “Komando.” 

What digital life-style questions do you will have? Name Kim’s nationwide radio present and faucet or click on right here to search out it in your native radio station. You’ll be able to take heed to or watch The Kim Komando Present in your cellphone, pill, tv, or pc. Or faucet or click on right here for Kim’s free podcasts. 

Copyright 2022, WestStar Multimedia Leisure. All rights reserved. By clicking the procuring hyperlinks, you’re supporting my analysis. As an Amazon Affiliate, I earn a small fee from qualifying purchases. I solely advocate merchandise I consider in. 

Find out about all the most recent expertise on The Kim Komando Present, the nation’s largest weekend radio discuss present. Kim takes calls and dispenses recommendation on at the moment’s digital life-style, from smartphones and tablets to on-line privateness and information hacks. For her every day ideas, free newsletters, and extra, go to her web site at Komando.com.  

Advertisement
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Instagram co-founder: Zuckerberg saw us as a ‘threat’ to Facebook

Published

on

Instagram co-founder: Zuckerberg saw us as a ‘threat’ to Facebook

When Instagram was acquired for $1 billion in 2012, co-founder Kevin Systrom believed that joining Facebook would help Instagram’s “skyrocketing growth” reach even greater heights.

In some ways, it did. Instagram now has billions of users and has since “generated many multiples of that price and then some,” Systrom said on Tuesday from a Washington, DC courtroom. But according to him, that success often came in spite of, not because of, Facebook’s help.

While testifying in the Federal Trade Commission’s lawsuit to force the spin-off of Instagram and WhatsApp from Meta, Systrom said that CEO Mark Zuckerberg repeatedly withheld critical resources from Instagram and constrained its growth to avoid harming Facebook’s engagement. To the chagrin of Meta’s attorneys, Systrom also made predictions about how, in hindsight, Instagram would have probably still succeeded on its own.

Over the course of about six hours, Systrom remained steady and confident on the witness stand. Zuckerberg himself sat in the same seat last week, describing how Instagram would likely not have become the social media powerhouse it is today without his help. In contrast, Systrom’s testimony portrayed Zuckerberg as a withholding and jealous boss. He described how he and Instagram’s other co-founder, Mike Krieger, quit in 2018 after growing increasingly frustrated with Zuckerberg’s meddling in Instagram’s operations.

In court, Systrom was presented with an internal chart from that same year detailing the feature integrations Facebook had made with Instagram. With the help of features like notifications promoting Instagram within Facebook and cross-posting between the apps, Instagram experienced growth, while Facebook saw a neutral effect.

Advertisement

Systrom said that, shortly before he and Krieger quit, Zuckerberg decided to end the feature integrations because, in Systrom’s view, he didn’t want Instagram to grow at the expense of Facebook. “We were a threat to their growth,” Systrom testified.

“If Instagram didn’t grow as quickly, Facebook wouldn’t shrink as quickly, or plateau as quickly,” Systrom said in court. “I don’t think he [Zuckerberg] ever said it out loud that way, but that was the only reason we were having this discussion.”

At the time, Instagram had just reached one billion users, which was about half of Facebook’s user base, with a fraction of the employees. Systrom felt that Zuckerberg was “underinvesting” in Instagram and giving it “zero resources,” which Systrom thought was “in stark contrast to the effort I was putting in.”

According to Systrom’s telling, ego played a role. Zuckerberg was “very happy to have Instagram in the family,” he testified. “But also, I think as the founder of Facebook, he felt a lot of emotion around which one was better, meaning Instagram or Facebook, and I think there were real human emotional things going on.”

“I think there were real human emotional things going on”

Advertisement

Systrom recalled other instances where Instagram was denied the resources it needed. When Mark Zuckerberg declared that video would be the next big shift in social networking, Facebook started allocating internal resources towards the push. The company initially allocated 300 employees to making video a prominent part of Facebook, while Instagram received no additional headcount.

Following the Cambridge Analytica data scandal that embroiled Facebook in controversy over its privacy practices, Systrom stated that his organization received “zero” of the billions of dollars in trust and safety resources that Zuckerberg had publicly committed to spending. Instead, he said Instagram was given access to a centralized team that was more focused on Facebook. He also described how, years earlier, Zuckerberg suddenly yanked members of the Facebook growth team who had been deployed to help Instagram.

During cross-examination, Meta attorney Kevin Huff attempted to discredit Systrom’s testimony. He hardly gave an inch by maintaining that Instagram would have likely been successful as an independent company. “You deal in a world of probabilities,” he said. “You can never be sure. Some things you can be more sure of.”

Huff’s questioning of Systrom got tense on several occasions. His stone-faced, one-liner responses prompted rounds of laughter in the courthouse media room, though Judge James Boasberg rarely cracked a smile. When Huff brought up an early email Systrom sent to Zuckerberg crediting an integration with Facebook for much of Instagram’s early growth, Systrom said he was only emphasizing the benefit to appease Zuckerberg.

Huff then asked Systrom if he was lying to Zuckerberg in the email. Seemingly irritated, Systrom stared back and simply said, “Sir.”

Advertisement

Continue Reading

Technology

Insurance data breach exposes sensitive info of 1.6 million people

Published

on

Insurance data breach exposes sensitive info of 1.6 million people

If there’s one thing I’ve learned from covering data breaches over the years, it’s that you should never take a company’s initial numbers at face value. When a breach becomes public, most companies try to minimize the damage by reporting fewer victims or staying vague about what kind of data was exposed.

Sometimes, to be fair, they genuinely don’t have the full picture yet. But that rarely gets communicated clearly. The same thing just happened again with an insurtech company that has now doubled the number of people affected by a breach it disclosed last year.

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT’S ‘THE CYBERGUY REPORT’ NOW

A woman working on her laptop (Kurt “CyberGuy” Knutsson)

What you need to know

Texas-based insurance administrative services provider Landmark Admin has revised the scope of its May 2024 cyberattack, revealing that nearly twice as many people were impacted as initially reported. Back in October 2024, Landmark disclosed that suspicious activity was detected in its network on May 13, prompting an investigation. At the time, it was estimated that the breach affected 806,519 individuals. But in a recent update filed with the Maine Attorney General’s office, that number has now jumped to 1,613,773.

Advertisement

Landmark serves as a third-party administrator offering backend support to major insurers like Liberty Bankers Life and American Benefit Life. This means millions of sensitive insurance policy records flow through its systems, making it a tempting target for cybercriminals.

The compromised information varies for each individual but may include a wide range of sensitive personal data. This includes full names, home addresses, Social Security numbers, tax identification numbers, driver’s license or state-issued identification numbers, passport numbers and bank account details. In some cases, medical information, dates of birth, health insurance policy numbers and details related to life and annuity policies may also have been exposed.

Insurance data breach exposes sensitive info of 1.6 million people

A hacker at work (Kurt “CyberGuy” Knutsson)

200 MILLION SOCIAL MEDIA RECORDS LEAKED IN MAJOR X DATA BREACH

What is Landmark doing now?

The company says the forensic investigation is still ongoing and that the total number of affected individuals may continue to rise. Personalized notification letters are being mailed out in phases, detailing exactly what type of data was compromised in each case.

“Landmark began reviewing the affected systems to identify the specific individuals and the types of information that may have been compromised,” reads the latest notice. “While this process remains ongoing, Landmark will notify affected individuals by mail as the information becomes available.”

Advertisement

To help mitigate the fallout, Landmark is offering 12 months of free credit monitoring and identity theft protection. The notice also advises recipients to monitor their credit reports and consider placing fraud alerts or a security freeze for extra protection. A dedicated helpline is available for 90 days after notification to address questions and concerns.

Insurance data breach exposes sensitive info of 1.6 million people

A man working on his laptop and scrolling on his phone (Kurt “CyberGuy” Knutsson)

MALWARE EXPOSES 3.9 BILLION PASSWORDS IN HUGE CYBERSECURITY THREAT

6 ways you can stay safe from insurance data breach

If your information was part of the Landmark breach or any similar one, it’s worth taking a few steps to protect yourself.

1) Consider identity theft protection services: Since the Landmark data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs.

Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. They often include up to $1 million to cover losses and legal fees and a white-glove fraud resolution team in which a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

Advertisement

2) Monitor your accounts and transactions: The Landmark data breach revealed bank details to attackers, which means they can misuse those details to steal your money. You should check your online accounts and transactions regularly for any suspicious or unauthorized activity. If you notice anything unusual, immediately report it to the service provider or authorities. You should also review your credit reports and scores to see if there are any signs of identity theft or fraud.

3) Contact your bank and credit card companies: Since Landmark hackers obtained bank and credit card information, they could use it to make purchases or withdrawals without your consent. You should inform your bank and credit card companies of the situation. They can help you freeze or cancel your cards, dispute any fraudulent charges and issue new cards for you. You should also contact one of the three major credit reporting agencies (Equifax, Experian or TransUnion) and request a fraud alert to be placed on your credit file. This will make it more difficult for identity thieves to open new accounts in your name without verification. 

4) Use personal data removal services: The data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you. One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

5) Have strong antivirus software: Landmark hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Advertisement

6) Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.

WINDOWS 10 SECURITY FLAWS LEAVE MILLIONS VULNERABLE

Kurt’s key takeaway

The real risk with breaches like this isn’t just the initial leak. It’s the slow drip of consequences that follow. As more names and numbers surface, the fallout becomes harder to contain, and the people impacted are left scrambling to protect themselves. Landmark’s delayed clarity is a reminder that in the world of cyberattacks, timelines rarely work in the public’s favor. By the time the full picture emerges, the damage may already be done. 

Do you think companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Advertisement

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Advertisement

Continue Reading

Technology

Pinterest is prompting teens to close the app at school

Published

on

Pinterest is prompting teens to close the app at school

Pinterest is testing a new pop-up prompt it will display to minors in the US and Canada during school hours, encouraging them to close the app and turn off notifications until the end of the day.

“Focus is a beautiful thing,” the prompt says. “Stay in the moment by putting Pinterest down and pausing notifs [sic] until the school bell rings.”

The pop-up will only appear to minors aged 13 to 17, and only between 8AM and 3PM, Monday to Friday. It’s a large-scale test, which Pinterest says will reach “millions” of school-age users. It claims to be the first tech company testing this sort of “proactive” feature to help students focus, after CEO Bill Ready announced support for the Kids Online Safety Act and phone-free school policies.

New York is close to implementing a statewide ban on phone use during the school day, and several other states already have policies limiting or prohibiting phone use. In Europe, countries like Denmark and the Netherlands have already banned phones in schools and France recently announced that teens will have to lock their phones away while at school from the next academic year.

Pinterest has also announced a $1 million grant to the International Society for Technology in Education (ISTE) to “support school leaders in creating a healthy digital culture in their schools.” The money will fund task forces across 12 US school districts to develop policies that “improve students’ digital wellbeing.”

Advertisement

“At Pinterest, we believe that schools can take advantage of all that technology has to offer students, while minimizing the harms and distractions,” said Wanji Walcott, Pinterest’s chief legal and business affairs officer. “Tech companies need to work together with teachers, parents, and policymakers to build solutions that ensure in the hands of our students, smartphones are tools, not distractions.”

Continue Reading
Advertisement

Trending