Normal view

There are new articles available, click to refresh the page.
Yesterday — 17 June 2024Main stream

Every act of fitness is part of how the Short Creek community rebuilds

By: chavenet
17 June 2024 at 14:55
Fifteen-year-old Darlene hadn't been in a classroom since fourth grade. She worked 11-hour days at a chicken restaurant, a step up from the slaughterhouse where she'd worked when she was younger. Every paycheck went to her parents who turned it over to the prophet. Everything the hardworking people did was in service to the prophet and to build up the church. Darlene's future was determined for her: She'd be a wife and mother, and serve the church and her husband. from This Is Not an Escape Story [Runner's World; ungated]

Racist taunts, rape threats and murder: Joe Penhall on his play about violence against MPs

17 June 2024 at 00:00

James Corden and Anna Maxwell Martin are starring in The Constituent, a play that asks if MPs are no longer safe. Here, its writer explores what politicians wearing stab vests means for democracy

Since the murders of Batley and Spen MP Jo Cox and Southend West MP Sir David Amess, we’ve seen a rising tide of viciousness aimed at locally elected politicians, by apparently fairly ordinary constituents. There are all manner of reasons, often surprisingly banal.

Female MPs are targeted for their gender. MPs from an ethnic minority background are disproportionately the target of racial or religious hatred. And some local MPs are targeted simply because they’re politicians, tasked with fixing problems they’re unable to fix. With a general election looming and MPs deciding which battles they can safely pick, there are fears the escalating hostility is a threat to democracy.

Continue reading...

💾

© Photograph: Manuel Harlan

💾

© Photograph: Manuel Harlan

Before yesterdayMain stream

Pregnant, Addicted and Fighting the Pull of Drugs

Many pregnant women who struggle with drugs put off prenatal care, feeling ashamed and judged. But as fatal overdoses rise, some clinics see pregnancy as an ideal time to help them confront addiction.

Kim Short, pregnant and staying at a sober living house, has struggled with drug and alcohol use since her early teens.

Female UK election candidates report increased abuse

14 June 2024 at 01:00

Politicians, activists and charities say online harassment is particularly bad, including hate speech and disinformation

Abuse of female election candidates is becoming worse, say candidates, activists and charities.

One female Labour candidate in the north of England said “the harassment continues apace” in the build-up to the election, with online harassment being a particular problem.

Continue reading...

💾

© Photograph: monkeybusinessimages/Getty Images

💾

© Photograph: monkeybusinessimages/Getty Images

"Charlie is the kind of guy where you just really want to believe him"

By: chavenet
6 June 2024 at 15:30
Wickwire recalls instances where other climbers lied about their ascents and were quickly banished. "No one would climb with them or believe what they said," he points out. But when it came to stories about Barrett's violence against women, people were too willing to look the other way—even after Barrett was arrested and a detailed indictment from a federal investigation was posted online. "There is a dissonance between how climbers think of themselves and what they actually do," says Kimbrough Moore, a longtime climber, a guidebook author, and a philosophy professor at San Francisco State University. "In my experience, the climbing community has been hostile to women who have come out saying they were assaulted." As for Barrett, Moore says: "I have never heard of anyone doing more to harm the climbing community than Charlie. He has used his status as an elite climber to hurt people for a very long time." from How Did This Climber Get Away with So Much for So Long? [Outside; ungated] [CW: rape, sexual violence, violence to animals, stalking, harassment, enabling]

Washing machine chime scandal shows how absurd YouTube copyright abuse can get

30 May 2024 at 14:28
Washing machine chime scandal shows how absurd YouTube copyright abuse can get

Enlarge (credit: Bloomberg / Contributor | Bloomberg)

YouTube's Content ID system—which automatically detects content registered by rightsholders—is "completely fucking broken," a YouTuber called "Albino" declared in a rant on X (formerly Twitter) viewed more than 950,000 times.

Albino, who is also a popular Twitch streamer, complained that his YouTube video playing through Fallout was demonetized because a Samsung washing machine randomly chimed to signal a laundry cycle had finished while he was streaming.

Apparently, YouTube had automatically scanned Albino's video and detected the washing machine chime as a song called "Done"—which Albino quickly saw was uploaded to YouTube by a musician known as Audego nine years ago.

Read 35 remaining paragraphs | Comments

Cybercriminals Abuse StackOverflow to Promote Malicious Python Package – Source:thehackernews.com

cybercriminals-abuse-stackoverflow-to-promote-malicious-python-package-–-source:thehackernews.com

Views: 0Source: thehackernews.com – Author: . May 29, 2024NewsroomSoftware Security / Supply Chain Cybersecurity researchers have warned of a new malicious Python package that has been discovered in the Python Package Index (PyPI) repository to facilitate cryptocurrency theft as part of a broader campaign. The package in question is pytoileur, which has been downloaded 316 […]

La entrada Cybercriminals Abuse StackOverflow to Promote Malicious Python Package – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

At home with the pronatalists

By: Wordshore
25 May 2024 at 11:29
[CW: eugenics, racism, violent child abuse incident] Guardian: "His little brother, two-year-old Torsten Savage, is on his iPad somewhere upstairs. Simone, 36, in an apron that strains across her belly, has her daughter, 16-month-old Titan Invictus, strapped to her back. The imminent arrival of their fourth child, a girl they plan to name Industry Americus Collins, turns out to be only the first in a string of surprises – and one really shocking thing – that I will encounter during my day with the pronatalists." [Previously: November 2022, You say 'Eugenics' like it's a bad thing (it is)]

Fate of Retired Research Chimps Still in Limbo

23 May 2024 at 05:03
The National Institutes of Health, which owns the chimps at the Alamogordo Primate Facility in New Mexico, has no plans to move the animals to sanctuary, despite a ruling from a federal judge.

© Emil Lippe for The New York Times

Carlee, a chimpanzee living in Chimp Haven, a 200-acre sanctuary in Louisiana that serves as the designated retirement home for federally owned chimps.

Farm Animals Are Hauled All Over the Country. So Are Their Pathogens.

20 May 2024 at 08:27
Tens of millions of farm animals cross state lines every year, traveling in cramped, stressful conditions that can facilitate the spread of disease.

© Rory Doyle for The New York Times

The exact number of chickens, cows and pigs being transported on trucks, ships, planes and trains within the United States is difficult to pinpoint because there is no national system for tracking the movement of livestock.

How to protect yourself from online harassment

10 April 2024 at 15:19

It takes a little to receive a lot of online hate today, from simply working as a school administrator to playing a role in a popular movie or video game.

But these moments of personal crisis have few, immediate solutions, as the current proposals to curb and stem online harassment zero in on the systemic—such as changes in data privacy laws to limit the personal information that can be weaponized online or calls for major social media platforms to better moderate hateful content and its spread.

Such structural shifts can take years (if they take place at all), which can leave today’s victims feeling helpless.

There are, however, a few steps that everyday people can take, starting now, to better protect themselves against online hate and harassment campaigns. And thankfully, none of them involve “just getting off the internet,” a suggestion that, according to Leigh Honeywell, is both ineffective and unwanted.

“The [idea that the] answer to being bullied is that you shouldn’t be able to participate in public life—I don’t think that’s okay,” said Honeywell, CEO and co-founder of the digital safety consultancy Tall Poppy.

Speaking to me on the Lock and Code podcast last month, Honeywell explained that Tall Poppy’s defense strategies to online harassment incorporate best practices from Honeywell’s prior industry—cybersecurity.

Here are a few steps that people can proactively take to limit online harassment before it happens.

Get good at Googling yourself

One of the first steps in protecting yourself from online harassment is finding out what information about you is already available online. This is because, as Honeywell said, much of that information can be weaponized for abuse.

Picture an angry diner posting a chef’s address on Yelp alongside a poor review, or a complete stranger sending in a fake bomb threat to a school address, or a real-life bully scraping the internet for embarrassing photos of someone they want to harass.  

All this information could be available online, and the best way to know if it exists is to do the searching yourself.

As for where to start?

“First name, last name, city name, or other characteristics about yourself,” Honeywell said, listing what, specifically, to search online.

It’s important to understand that the online search itself may not bring immediate results, but it will likely reveal active online profiles on platforms like LinkedIn, X (formerly Twitter), Facebook, and Instagram. If those profiles are public, an angry individual could scrape relevant information and use it to their advantage. Even a LinkedIn profile could be weaponized by someone who calls in fake complaints to a person’s employer, trying to have them fired from their position.

In combing through the data that you can find about yourself online, Honeywell said people should focus on what someone else could do with that data.

“If an adversary was trying to find out information about me, what would they find?” Honeywell said. “If they had that information, what would they do with it?”

Take down what you can

You’ve found what an adversary might use against you online. Now it’s time to take it down.

Admittedly, this can be difficult in the United States, as Americans are not protected by a national data privacy law that gives them the right to request their data be deleted from certain websites, platforms, and data brokers.

Where Americans could find some help, however, is from online resources and services that streamline the data removal process that is enshrined in some state laws. These tools, like the iOS app Permission Slip, released by Consumer Reports in 2022, show users what types of information companies are collecting about them, and give user the opportunity to request that such data be deleted.

Separately, Google released on online tool in 2023 where users can request that certain search results that contain their personal information be removed. You can learn more about the tool, called “Results about you,” here.

When all else fails, Honeywell said that people shouldn’t be afraid to escalate the situation to their state’s regulators. That could include filing an official complaint with a State Attorney General, or with the Consumer Financial Protection Bureau, or the Federal Trade Commission.

“It sounds like the big guns,” Honeywell said, “but I think it’s important that, as individuals, we do what we can to hold the companies that are creating this mess accountable.”

Lock down your accounts

If an adversary can’t find your information through an online search, they may try to steal that information by hacking into your accounts, Honeywell said.

“If I’m mad at David, I’m going to hack into David’s email and share personal information,” Honeywell said. “That’s a fairly standard way that we see some of the worst online harassment attacks escalate.”

While hackers may have plenty of novel tools at their disposal, the best defenses you can implement today are the use of unique passwords and multifactor authentication.

Let’s first talk about unique passwords.

Each and every single one of your online accounts—from your email, to your social media profiles, to your online banking—should have a strong, unique password. And because you likely have dozens upon dozens of online accounts to manage, you should keep track of all those passwords with a devoted password manager.

Using unique passwords is one of the best defenses to company data breaches that expose user login credentials. Once those credentials are available on the dark web, hackers will buy those credentials so they can attempt to use them to gain access to other online accounts. You can prevent those efforts going forward by refusing to repeat passwords across any of your online accounts.

Now, start using multifactor authentication, if you’re not already.

Multifactor authentication is offered by most major companies and services today, from your bank, to your email, to your medical provider. By using multifactor authentication, also called MFA or 2FA, you will be required to “authenticate” yourself with more than just your password. This means that when you enter your username and password onto a site or app, you will also be prompted with entering a separate code that is, in many cases, sent to your phone via text or an app.

MFA is one of the strongest protections to password abuse, ensuring that, even if a hacker has your username and password, they still can’t access your account because they will not have the additional authentication that is required to complete a login.

In the world of cybersecurity, these two defense practices are among the gold standard in stopping cyberattacks. In the world of online harassment, they’re much the same—they work to prevent the abuse of your online accounts.

Here to help

Online harassment is an isolating experience, but protecting yourself against it can be quite the opposite. Honeywell suggested that, for those who feel overwhelmed or who do not know where to start, they can find a friend to help.

“Buddy up,” Honeywell said. “If you’ve got a friend who’s good at Googling, work on each other’s profile, identify what information is out there about you.”

Honeywell also recommended going through data takedown requests together, as the processes can be “extremely tedious” and some of the services that promise to remove your information from the internet are really only trying to sell you a service.

If you’re still wondering what information about you is online and you aren’t comfortable with your way around Google, Malwarebytes has a new, free tool that reveals what information of yours is available on the dark web and across the internet at large. The Digital Footprint Portal, released in April, provides free, unlimited scans for everyone, and it can serve as a strong first step in understanding what information of yours needs to be locked down.

To learn what information about you has been exposed online, use our free scanner below.

❌
❌