How to combat internet and online disinformation.

Views expressed in this cybersecurty-cyber crime-cyber war update are those of the reporters and correspondents.

Accessed on 02 March 2022, 0301 UTC.

Content supplied by “PCMag Security Watch.”

Source:

https://mail.google.com/mail/u/0/#inbox/FMfcgzGmvLNNWcKKQTMNLJKfqBmSXMhM

Please click link or scroll down to read your selections.

 
 
PCMag SecurityWatch
 
6 Ways to Spot Russia-Ukraine Disinformation
As Russia continues its invasion of Ukraine, social media users around the world circulate posts detailing ways to help Ukrainian people. Some call for protests, others for thoughts and prayers, but there are many calls for cash—which can be a risky way to show your support.

On Valentine’s Day, we asked you not to send money to people you’ve never met in person over the internet. I realize the current conflict in Eastern Europe is far more complicated than a lonely hearts situation, but I echo my previous warnings. Don’t send money to individuals you don’t know online. 

Remember that anyone can be on the other side of the screen. Does the person on Instagram claiming to be in a war zone exist? Or are they a 21-year-old in Kentucky recycling old military footage in an effort to profit off human tragedy? There’s a lot of money and clout to be gained from spreading disinformation online. Don’t be duped. 

How to Spot Disinformation Tactics and Not Further Their Scams

  1. Ignore follower counts and look for high-quality followers instead. 
    Meme accounts on Instagram, Twitter, and Tiktok amass millions of followers quickly, usually a mix of bots and real people. High follower counts do not equal legitimacy. A good sign of a legitimate account is one that’s followed by government officials or journalists from major news organizations.

  2. Verify the media you consume.
    Accounts spreading disinformation around the current Russia-Ukraine conflict may use photos from previous wars or military exercises, which you can find and debunk with a simple reverse image search.

    Video is a different animal. It’s tougher to expose fake videos quickly, which is why a lot of scammers and sham artists on social media use the medium. From video game renders, to recent videos from other invasions, no footage is off limits for a disinformation campaign.

    Heed these warnings, and view all streaming videos purporting to be from war zones and broadcast by social media accounts with suspicion. Ask yourself “What does this user have to gain by sharing this video?” Many of these live-streaming accounts run fundraisers or advertise pornographic OnlyFans accounts in between war footage, which is a giant red flag.

  3. Think before you share. 
    Even if you only have a few followers or subscribers, you have a voice. To your circle of friends, you lend legitimacy to every link you share and every photo or video you retweet. Keep everyone safer by only sharing information from verified government accounts or verified news media. Yes, bloggers have the freedom to say what they feel, but they can color information with their opinions. When sharing posts that are pertinent to another person’s life or death, stick to the facts.

  4. Ignore the fundraiser button.
    Anyone can create a legitimate-looking fundraiser in a few seconds using most social platforms. If you want to donate money to the Ukrainian military, go to the country’s Twitter account and use the links provided there.

  5. Stay out of the DMs.
    If someone you don’t know sends you a private message asking for you to follow an account, click a link for more information, or donate to their plight, do not respond. Just report, block, and move on.

  6. Follow the money.
    If, for instance, a Twitch streamer asks for donations to help Ukraine, don’t feel bad about asking in the chat how they plan to get the money to the people in need. Not everyone is a scammer, and if the fundraiser is legit, the streamer will be able to explain their method of financial dispersal through an official channel such as the Ukrainian government’s financial links. 

Scammers love to capitalize on victims’ feelings, and emotions online are running high right now. Constant vigilance and taking the time to vet charities and accounts online may save you lost money and lost faith in humanity in the long run.

Stay safe,
Kim Key
PCMag Security Analyst

Get this email from a friend? Get it delivered to your inbox weekly. Sign up for the SecurityWatch newsletter.


What Else Is Happening in the Security World This Week?

Backing Russia Backfires as Conti Ransomware Gang Internal Chats Leak. The leak occurred after the leader of the gang posted a pro-Russian message and threat.

Ukraine Enlists Hackers in ‘IT Army’ Targeting Russia, Belarus. No quiet on the cyber front.

Nvidia Investigates Potential Ransomware Incident. The company has confirmed there was a breach, but says it’s still investigating the full extent of the incident.

I Went to a Russian Website and All I Got Was This Lousy Teapot. Russian websites hit with DDoS attacks have responded by cutting off access coming from outside Russia. But what does their security response have to do with teapots and the number 418?

VPNs vs. Proxies: What’s the Difference? Proxies and VPNs both let you change how your web traffic is perceived by the outside world, but they’re fundamentally different technologies. We explain which one is right for you.

 
 
TECH DEAL OF THE DAY
 
If you buy something from our links, we may get a commission from the sale. Learn more here.
 
$55 off Norton 360 Deluxe Annual Subscription + 50GB Cloud Backup, Secure VPN
 
$104.99 $49.99  
GET DEAL
 
TODAY’S TOP NEWS
 
Preparing for War’s Cyber Front
Malware has a lot of wartime uses: espionage, data destruction, or it can cause hardware to shut down. Currently, malware is causing major issues in Ukraine. Experts say the program, called Hermetic Wiper, damages the portion of the hard drive that makes the rest of the drive readable.

PCMag lead security analyst Neil J. Rubenking writes the best way to prepare for nation-state cyber-attacks is to keep your antivirus up to date.  Tests from antivirus lab AV-Comparatives show that popular antivirus tools can help you defend your computer from attackers great and small.  In a blog post, AV-Comparatives reported that 17 consumer antivirus products effectively protected against multiple variants of Hermetic Wiper.

You may or may not live far away from the Russia-Ukraine war, but for better or worse, the internet can bring us all closer together. You could find yourself a target of malware for the views you express online, or your geographic location. Keeping your antivirus up to date can protect your computer from becoming collateral damage.


US Warns Destructive Malware Hitting Ukraine Could ‘Spill Over’ to Infect Others

Hackers Behind Nvidia Breach Are Now Selling Ethereum Mining Bypass for GPUs

How to Watch Porn Safely

How (and Why) to Change Your DNS Server

Biden: We’re Prepared to Respond if Russia Hits US With Cyberattacks

 
TOP TECH DEALS
Want more deals like these delivered to your inbox?
GET OUR BEST DEALS TODAY
 
Quickship Dell Inspiron 15 5000 Touch AMD Ryzen 5 5500U 15.6″ 1080p Laptop w/ 256GB SSD, 8GB RAM
 
$688.99 $549.99  
GET DEAL

 
Alienware Aurora R12 Intel Core i9-11900F Gaming Desktop w/ NVIDIA RTX 3060, 32GB RAM & 1TB SSD
 
$2,399.99 $1,499.99  
GET DEAL

 
Dolby Vision Model 65″ Amazon Fire TV Omni Series 4K HDR 10 Smart TV
 
$829.99 $499.99  
GET DEAL

 
NVIDIA RTX 3080 Alienware Aurora R10 AMD Ryzen 9 5900 Gaming Desktop w/ 1TB SSD, 16GB RAM
 
$2,869.99 $2,199.99  
GET DEAL

 
34″ Samsung Odyssey G5 (C34G55T) 3440×1440 1ms 165Hz HDR10 Curved Gaming Monitor
 
$549.99 $429.99  
GET DEAL

All product and deal information such as discount, price and availability are believed to be accurate as of the time of publication. Please verify these details with the merchant site and check the merchant’s terms and conditions before you buy. Publisher is not responsible for errors or omissions.
SHARE & FOLLOW US
      

 

For the latest cybersecurity news and information, please check the blog sidebar, links, and twitter posts. Thanks for joining us today.

Russ Roberts

https://cyber-security-intelligence.org

https://paper.li/RussellRoberts (machine learning, artificial intelligence, IoT, and information security)