Fake News, Disinformation and Misinformation Articles

5G Health Risks – Health, Wealth and Tin Foil Hats

5G Health Concerns
The rollout of 5G is one of the most anticipated events in humanity’s technological history. But what about the 5G health concerns? It’s the night before Halloween in 1938 and, as the tale goes, radio audiences tuning into Orson Welles’ reading of War of the Worlds are driven to panic. Apparently listening to an ordinary radio broadcast, the public hear of an unfolding Martian invasion and a chaos of heat rays, poisonous gas and alien war machines. The news account is met with hysteria. Someone hearing this story for the first time may find it laughable that people could be so easily duped. Welles himself denied expecting any such response. But the experience would have taught the celebrated young dramatist a few lessons,...

AI-Exacerbated Disinformation and Cyber Threats to Democracy

AI Fake News
Recent events have confirmed that the cyber realm can be used to disrupt democracies as surely as it can destabilize dictatorships. Weaponization of information and malicious dissemination through social media pushes citizens into polarized echo chambers and pull at the social fabric of a country. Present technologies enhanced by current and upcoming Artificial Intelligence (AI) capabilities, could greatly exacerbate disinformation and other cyber threats to democracy. Robert Kagan in his recent Post essay, “The strongmen strike back,” insightfully states: What we used to regard as the inevitable progress toward democracy, driven by economics and science, is being turned on its head. In non-liberal societies, economics and science are leading toward the perfection of dictatorship. Kagan refers to state surveillance and social...

Human Zombification as an Information Security Threat

Zombification Cybersecurity Social Engineering
Human Zombification as an Information Security Threat – Differences in Information Security Concepts Between Euro-Atlantic and China-Russia China and Russia share an information security doctrine, one that is significantly different from Euro-Atlantic doctrines. In the Chino-Russian model of information space a discussion about population zombification does happen and it fits squarely within the domain of information security. No, this is not an Onion article. China and Russia have significantly broader definitions of Information Security than US, UK and other mostly aligned Euro-Atlantic nations. Fundamentally different conceptual approaches to information security are behind ongoing failures to reach an agreement on cyber security issues between Euro-Atlantic nations on one side and China and Russia on the other. Despite the increased willingness to cooperate,...

Social Engineering – Greatest Information Security Risk

Social Engineering
Social engineering doesn't have to be just a supporting process to obtain system access; it is could be even more dangerous when it is used as the main attack. We, information security defenders, rarely consider that risk. If you think Social Engineering is an effective way to obtain access to systems by exploiting the weakest link – people – you are correct. But not completely correct. Social engineering could be much more than what is being discussed in the media or on social engineering awareness sessions. Social Engineering is the most effective way to: obtain information. It’s a subtle difference, but one with huge implications. If the attacker's goal is to obtain human-manageable information such as certain types of intellectual property, information about...

Most popular articles this week

Copy link
Powered by Social Snap