Fake News

8 Ways to Determine If a News Story Is Reliable

Fake News

During a 2017 interview on the Christian Trinity Broadcasting Network, President Donald Trump claimed his use of the word “fake” to describe the media was “one of the greatest of all terms [he’d] come up with.”

While he was mistaken about his creation of the phrase “fake news,” Trump’s frequent use of the epithet to describe news media has no doubt popularized the label — and may have even led to the phrase’s inclusion in the Dictionary.com database.

It may seem at times like fake news is an epidemic unique to our current political climate, but it’s actually been around for centuries. Let’s take a closer look at what it is, how it spreads, and what you can do to detect it.

What Is Fake News?

As its name suggests, fake news is false or counterfeit information reported in a newspaper, news periodical, or newscast.

Fake news differs from satire, farce, or hyperbole in that it’s a deliberate attempt to spread misinformation and manipulate public opinion for political, financial, or social gain. Inaccurate content is packaged to appear as fact, thus duping the audience into believing it’s true.

A story doesn’t have to be totally made-up to mislead; it’s enough to present subtle misrepresentations, critical omissions, or out-of-context information. Examples of recent misleading or false information include claims that:

  • President Barak Obama was born outside the U.S.
  • Senator Ted Cruz was bribed to pass legislation that put America’s public lands in the hands of the Koch brothers for mining and other business pursuits.
  • The Affordable Care Act established a “death panel” to determine healthcare benefits for the sick and elderly.
  • Pope Francis endorsed Donald Trump for President. (A later report revealed that the Pope supported Hillary Clinton.)
  • Millions of illegal voters voted in the 2016 presidential election.

All of the above have been labeled false by fact-checking organizations like PolitiFact, FactCheck, OpenSecrets, and Snopes, yet there are still those who believe these stories to be true.

Why does fake news spread so rapidly? As Craig Silverman of Neiman Reports writes in the Columbia Journalism Review: “[T]he forces of untruth have more money, more people, and… much better expertise. They know how to birth and spread a lie better than we know how to debunk one. They are more creative about it, and, by the very nature of what they’re doing, they aren’t constrained by ethics or professional standards. Advantage, liars.”

Click to Read More . . .

Killer Apps Explained – History, Examples, Impacts & Future


 
Can you imagine a future where computers monitor humans from birth, predict sickness, and help us heal faster? Or a time when chronically ill or elderly persons can live at home and be monitored by instruments that a home nurse or caregiver can use?
 
Judith Donath, a fellow at Harvard University’s Berkman Center for Internet and Society, predicts that individual healthy diets based on each person’s unique genetics, locations, and activities are going to be common in the future, while drugstores will have booths that function as remote examining, treatment, and simple surgery rooms. In 1950, few could imagine the impact computers would have on everyday life in the year 2000. Today, everyone has a mobile phone, email has replaced physical letters, and online markets are challenging the economics of brick-and-mortar retailers.

The Emergence of Killer Applications (Apps)

Merriam-Webster defines “killer app” as “a computer application of such great value or popularity that it assures the success of the technology with which it is associated.” PC Magazine calls it “the first of a new breed.” To a layman, a killer app is a computer application that saves money, time, or energy, makes the user safer, or enhances the experiences of the user to the degree that it must be acquired and used.
 
The 1979 appearance of the first killer app, VisiCalc, ignited widespread business and personal use by consumers – use that couldn’t have been conceived of in the early 1940s when computers were first developed. According to the Computer History Museum, computer use in its initial stages was limited to research laboratories, large companies, and the Federal Government.
 
Personal computers (PCs) appeared in the early 1970s with the introduction of the microprocessor, integrated circuit boards, and solid state memory. The first commercially accepted PCs (Apple II, PET 2000, and TRS-80) were introduced in 1977 but remained niche products for the scientific community and hobbyists. According to a 1983 article in InfoWorld, only a half-million microcomputers were in place in 1980, and they were primarily used to play simple electronic games.
 
Read more . . .

9 Easy Ways to Make Housing More Affordable


Shelter is one of our basic human needs. A home protects us from the elements and predators, provides a sense of well-being and intimacy, and secures our social status in the community. In many ways, a house or shelter represents and defines the quality of life we experience.
 
Unfortunately, housing costs are the single greatest expense for an average family, according to the Bureau of Labor Statistics (BLS). In 2015, housing costs represented 19.1% of total household expenditures in 2015. That figure doesn’t even include related expenses including property taxes, insurance, or utilities.
 
For generations, purchasing a home was considered almost risk-free, the value of the home certain to grow over time. Many Americans discovered in the 2008-2009 recession that home prices could decline. According to the National Center of Policy Analysis, more American families lost their homes in 2008 (10 million) than in the 1930s Depression and Dust Bowl.
 
Affordability should be the primary factor in determining the place and size of your home. Here are some actionable tips to help keep your costs down.

Reducing Your Major Housing Costs

Controlling your housing costs is essential if you want to live within your means. The following tips will help you manage the expense.
 
Read more . . .

10 Ways to Protect Your Privacy Online

Who knows the Evil that lurks in the hearts of men?
In May 2017, more than 230,000 computers around the world were taken hostage by the WannaCry malware worm. Known as ransomware, the unknown developers surreptitiously gained control of computers running the Microsoft Windows operating system, encrypted the users’ data, and demanded a payment of $300 in untraceable bitcoins to unlock the system and access information.
 
Cyber-attacks occur across borders and range from simple email “phishing” efforts to sophisticated software programs that quickly expand the attacks and hide the identity of the perpetrators. Motives of cyber criminals range from vanity (proving one’s technical expertise) to illegal profit. Some attacks are politically motivated while others are rarely publicized, state-sponsored sabotage. The attacks affect individuals, businesses, and governments.
 
According to a report by the Ponemon Institute, a successful hacker earns $14,711 for each attack and has 8.26 successful attacks per year. Sophisticated hacking tools are readily available on the Internet, especially the Dark Web. The criminals and the curious are stepping up their efforts to invade your privacy and steal your money. What actions can you take to harden the target and protect your assets?
 
What actions can you take to harden the target and protect your assets?

Understand the Enemy

Malicious software can wreak havoc on your computer or operate covertly in the background. Malware (The Creeper Worm) was first detected on the ARPANET, the forerunner of the Internet, in the early 1970s. Since that time, spurred by the growth of personal computers and connected communication networks, many different types of malware have appeared, including:
 
Trojans: The most common malware is based on the Greek strategy to invade Troy: the Trojan Horse. In this case, users are tricked into allowing an outsider unlimited access to their computers by clicking on an unsafe Internet link, opening an email attachment, or completing a form. By themselves, Trojans are delivery vehicles, providing a “backdoor” into a computer or network. As a consequence, they open the door for malicious software to steal data, compromise operating systems, or spy on users. Trojans do not replicate themselves and spread to other devices like a virus or a worm.
Viruses: Just as a biological virus is transmitted to unsuspecting hosts, a computer virus replicates itself and infects new computers, then modifies operating programs to malfunction. Some have called viruses “diseases of machinery,” a term first coined in the 1972 futuristic film “Westworld.” One of the early viruses – Love Letter – delivered by an email with the subject line “I Love You” and an attachment “L0VE-LETTER-FOR-YOU.TXT” – attacked 55 million computers worldwide and caused an estimated $10 billion in damage, according to Wired magazine.
 
Read more . . .