Fake News

8 Ways to Determine If a News Story Is Reliable

Fake News

During a 2017 interview on the Christian Trinity Broadcasting Network, President Donald Trump claimed his use of the word “fake” to describe the media was “one of the greatest of all terms [he’d] come up with.”

While he was mistaken about his creation of the phrase “fake news,” Trump’s frequent use of the epithet to describe news media has no doubt popularized the label — and may have even led to the phrase’s inclusion in the Dictionary.com database.

It may seem at times like fake news is an epidemic unique to our current political climate, but it’s actually been around for centuries. Let’s take a closer look at what it is, how it spreads, and what you can do to detect it.

What Is Fake News?

As its name suggests, fake news is false or counterfeit information reported in a newspaper, news periodical, or newscast.

Fake news differs from satire, farce, or hyperbole in that it’s a deliberate attempt to spread misinformation and manipulate public opinion for political, financial, or social gain. Inaccurate content is packaged to appear as fact, thus duping the audience into believing it’s true.

A story doesn’t have to be totally made-up to mislead; it’s enough to present subtle misrepresentations, critical omissions, or out-of-context information. Examples of recent misleading or false information include claims that:

  • President Barak Obama was born outside the U.S.
  • Senator Ted Cruz was bribed to pass legislation that put America’s public lands in the hands of the Koch brothers for mining and other business pursuits.
  • The Affordable Care Act established a “death panel” to determine healthcare benefits for the sick and elderly.
  • Pope Francis endorsed Donald Trump for President. (A later report revealed that the Pope supported Hillary Clinton.)
  • Millions of illegal voters voted in the 2016 presidential election.

All of the above have been labeled false by fact-checking organizations like PolitiFact, FactCheck, OpenSecrets, and Snopes, yet there are still those who believe these stories to be true.

Why does fake news spread so rapidly? As Craig Silverman of Neiman Reports writes in the Columbia Journalism Review: “[T]he forces of untruth have more money, more people, and… much better expertise. They know how to birth and spread a lie better than we know how to debunk one. They are more creative about it, and, by the very nature of what they’re doing, they aren’t constrained by ethics or professional standards. Advantage, liars.”

Click to Read More . . .

Killer Apps Explained – History, Examples, Impacts & Future


 
Can you imagine a future where computers monitor humans from birth, predict sickness, and help us heal faster? Or a time when chronically ill or elderly persons can live at home and be monitored by instruments that a home nurse or caregiver can use?
 
Judith Donath, a fellow at Harvard University’s Berkman Center for Internet and Society, predicts that individual healthy diets based on each person’s unique genetics, locations, and activities are going to be common in the future, while drugstores will have booths that function as remote examining, treatment, and simple surgery rooms. In 1950, few could imagine the impact computers would have on everyday life in the year 2000. Today, everyone has a mobile phone, email has replaced physical letters, and online markets are challenging the economics of brick-and-mortar retailers.

The Emergence of Killer Applications (Apps)

Merriam-Webster defines “killer app” as “a computer application of such great value or popularity that it assures the success of the technology with which it is associated.” PC Magazine calls it “the first of a new breed.” To a layman, a killer app is a computer application that saves money, time, or energy, makes the user safer, or enhances the experiences of the user to the degree that it must be acquired and used.
 
The 1979 appearance of the first killer app, VisiCalc, ignited widespread business and personal use by consumers – use that couldn’t have been conceived of in the early 1940s when computers were first developed. According to the Computer History Museum, computer use in its initial stages was limited to research laboratories, large companies, and the Federal Government.
 
Personal computers (PCs) appeared in the early 1970s with the introduction of the microprocessor, integrated circuit boards, and solid state memory. The first commercially accepted PCs (Apple II, PET 2000, and TRS-80) were introduced in 1977 but remained niche products for the scientific community and hobbyists. According to a 1983 article in InfoWorld, only a half-million microcomputers were in place in 1980, and they were primarily used to play simple electronic games.
 
Read more . . .

10 Ways to Protect Your Privacy Online

Who knows the Evil that lurks in the hearts of men?
In May 2017, more than 230,000 computers around the world were taken hostage by the WannaCry malware worm. Known as ransomware, the unknown developers surreptitiously gained control of computers running the Microsoft Windows operating system, encrypted the users’ data, and demanded a payment of $300 in untraceable bitcoins to unlock the system and access information.
 
Cyber-attacks occur across borders and range from simple email “phishing” efforts to sophisticated software programs that quickly expand the attacks and hide the identity of the perpetrators. Motives of cyber criminals range from vanity (proving one’s technical expertise) to illegal profit. Some attacks are politically motivated while others are rarely publicized, state-sponsored sabotage. The attacks affect individuals, businesses, and governments.
 
According to a report by the Ponemon Institute, a successful hacker earns $14,711 for each attack and has 8.26 successful attacks per year. Sophisticated hacking tools are readily available on the Internet, especially the Dark Web. The criminals and the curious are stepping up their efforts to invade your privacy and steal your money. What actions can you take to harden the target and protect your assets?
 
What actions can you take to harden the target and protect your assets?

Understand the Enemy

Malicious software can wreak havoc on your computer or operate covertly in the background. Malware (The Creeper Worm) was first detected on the ARPANET, the forerunner of the Internet, in the early 1970s. Since that time, spurred by the growth of personal computers and connected communication networks, many different types of malware have appeared, including:
 
Trojans: The most common malware is based on the Greek strategy to invade Troy: the Trojan Horse. In this case, users are tricked into allowing an outsider unlimited access to their computers by clicking on an unsafe Internet link, opening an email attachment, or completing a form. By themselves, Trojans are delivery vehicles, providing a “backdoor” into a computer or network. As a consequence, they open the door for malicious software to steal data, compromise operating systems, or spy on users. Trojans do not replicate themselves and spread to other devices like a virus or a worm.
Viruses: Just as a biological virus is transmitted to unsuspecting hosts, a computer virus replicates itself and infects new computers, then modifies operating programs to malfunction. Some have called viruses “diseases of machinery,” a term first coined in the 1972 futuristic film “Westworld.” One of the early viruses – Love Letter – delivered by an email with the subject line “I Love You” and an attachment “L0VE-LETTER-FOR-YOU.TXT” – attacked 55 million computers worldwide and caused an estimated $10 billion in damage, according to Wired magazine.
 
Read more . . .

How to Identify Financial Scams & Investment Schemes

An old proverb claims, “The art is not in making money, but in keeping it.” Unfortunately, con artists and swindlers are anxious to separate you from your money by means of deception and fraud.
 
In an interview with BBC Future, Dr. Eryn Newman of the University of Southern California said a positive story that “feels smooth and easy to process” is easy to accept as truth. Con artists are particularly talented in creating believable lies. Falling for their tricks costs U.S. citizens billions every year.
 
According to Anthony Pratkanis, “Every year, Americans lose over $40 billion in telemarketing, investment, and charity fraud.” However, this amount may be vastly understated because instances of fraud are likely under-reported. According to the Financial Fraud Research Center, up to 65% of victims fail to report their victimization. They typically do not tell the authorities because they lack confidence in the police and the likelihood of restitution. Many are embarrassed by their gullibility.
 
But in her interview, Dr. Newman claims that gullibility – the tendency to be duped or manipulated by one or more people – does not reflect intelligence. Anybody can fall prey to a financial scheme or scam. Therefore, your best line of defense is to have a thorough understanding of how con artists operate – and how to spot them before they take advantage of you.

The Players

Marks

Victims of scams – known as “marks” – are often fooled when they hope to get something for nothing or very little. Other victims – often the elderly – may be susceptible due to their good intentions and desire to help others.
 
While many believe that the typical victim of an investment scam is older and less educated than the general populace, the Financial Fraud Research Center reports that this stereotype is false. The average investment fraud victim is “more likely to be male, relatively wealthy, risk-taking, interested in persuasive statements, open to sales situations, and better educated than the general public.” Martha Deevy, director of the Stanford Center on Longevity’s Financial Security Division, stated in an interview with the American Psychological Association that the typical investment fraud victim is a middle-aged, married, educated, financially literate white male under some financial strain.
 
Dr. Stephen Greenspan has spent more than a decade studying the problem of gullibility. In the The Wall Street Journal, Dr. Greenspan names four distinct factors that make a person more susceptible to being duped:
 
Read More . . .