Security Now! #521 - 08-18-15 Security Is Difficult
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Ethics for Digital Journalists
ETHICS FOR DIGITAL JOURNALISTS The rapid growth of online media has led to new complications in journalism ethics and practice. While traditional ethical principles may not fundamentally change when information is disseminated online, applying them across platforms has become more challenging as new kinds of interactions develop between jour- nalists and audiences. In Ethics for Digital Journalists , Lawrie Zion and David Craig draw together the international expertise and experience of journalists and scholars who have all been part of the process of shaping best practices in digital journalism. Drawing on contemporary events and controversies like the Boston Marathon bombing and the Arab Spring, the authors examine emerging best practices in everything from transparency and verifi cation to aggregation, collaboration, live blogging, tweet- ing, and the challenges of digital narratives. At a time when questions of ethics and practice are challenged and subject to intense debate, this book is designed to provide students and practitioners with the insights and skills to realize their potential as professionals. Lawrie Zion is an Associate Professor of Journalism at La Trobe University in Melbourne, Australia, and editor-in-chief of the online magazine upstart. He has worked as a broadcaster with the Australian Broadcasting Corporation and as a fi lm journalist for a range of print publications. He wrote and researched the 2007 documentary The Sounds of Aus , which tells the story of the Australian accent. David Craig is a Professor of Journalism and Associate Dean at the University of Oklahoma in the United States. A former newspaper copy editor, he is the author of Excellence in Online Journalism: Exploring Current Practices in an Evolving Environ- ment and The Ethics of the Story: Using Narrative Techniques Responsibly in Journalism . -
Malvertising - a Rising Threat to the Online Ecosystem
2016 Proceedings of the Conference on Information Systems Applied Research ISSN: 2167-1508 Las Vegas, Nevada USA v9 n4266 __________________________________________________________________________________________________________________________ Malvertising - A Rising Threat To The Online Ecosystem Catherine Dwyer [email protected] Ameet Kanguri [email protected] Seidenberg School of Computer Science & Information Systems Pace University New York, New York, USA Abstract Online advertising is a multi-billion dollar industry that supports web content providers around the globe. A sophisticated technology known as real time bidding (RTB) dominates the advertising landscape, connecting advertisers with specific online customers of interest. With RTB, when web visitors connect to a site, advertising networks are notified of space available on that site along with what can be gleaned about the visitor. These combinations of space and visitor are auctioned, and the winning bid’s ad content is served to the web visitor. The entire process, from a visitor landing on a publisher’s page to ads being auctioned, selected and served, takes 200 milliseconds, the time needed to snap your fingers. This tightly choreographed interaction is a technical marvel, but one with built in risks. The just-in-time collaboration between ever changing technology providers gives an opening to malicious actors, who through devious means, use ad networks to deliver malware rather than ads. Delivering malware as an ad is called malvertising, and its presence on otherwise credible sites is dangerous, undermining the business models of trustworthy publishers and legitimate online advertisers. The purpose of this paper is to introduce malvertising, describe its relationship with online advertising, and identify the risks RTB and malvertising bring to the online ecosystem. -
Storytelling and Social Media
NIEMAN REPORTS Storytelling and Social Media HANNA, one of the subjects in “Maidan: Portraits from the Black Square,” Kiev, February 2014 Nieman Online From the Archives For some photojournalists, it’s the shots they didn’t take they remember best. In the Summer 1998 issue of Nieman Reports, Nieman Fellows Stan Grossfeld, David Turnley, Steve Northup, Stanley Forman, and Frank Van Riper reflect on the shots they missed, whether by mistake or by choice, in “The Best Picture I Never Took” series. Digital Strategy at The New York Times In a lengthy memo, The New York Times revealed that it hopes to double its “Made in Boston: Stories of Invention and Innovation” brought together, from left, author digital revenue to $800 million by 2020. Ben Mezrich, Boston Globe reporter Hiawatha Bray, author Steve Almond, WGBH’s “Innovation The paper plans to simplify subscriptions, Hub” host Kara Miller, NPR’s “On Point” host Tom Ashbrook, “Our Bodies, Ourselves” improve advertising and sponsorships, co-founder Judy Norsigian, journalist Laurie Penny, and MIT Media Lab director Joi Ito optimize for different mediums, and nieman.harvard.edu, events extend its international reach. No Comments An in-depth look at why seven major news organizations—Reuters, Mic, The Week, Popular Science, Recode, The Verge, and USA Today’s FTW—suspended user comments, the results of that decision, and Innovators “always said how these media outlets are using social no when other people media to encourage reader engagement. said yes and they always 5 Questions: Geraldine Brooks Former Wall Street Journal foreign said yes when other correspondent and Pulitzer Prize-winning novelist Geraldine Brooks talks with her old Columbia Journalism School classmate people said no. -
What's Podcasting to You? Exploring Perspectives of Consumers and Producers
What's Podcasting to you? Exploring Perspectives of Consumers and Producers Student Name - Arshdeep Chawla Module - COMM5600: Dissertation & Research Methods Course - MA New Media Submitted on - 3 September 2018 Page !1 of !79 TABLE OF CONTENTS Introduction 4 Chapter I - Literature Review 6 Podcasting 6 Overview: Podcasting Industry 7 Overview: Podcast Production 11 Experimental Application Perpective 16 Emerging Technologies - Redefining Podcast Discovery? 17 Pivotal Shows and Trends 21 Chapter II - Methodology 23 Interview 24 Chapter III - Findings, Discussions and Analysis 29 Podcasting 29 Software 33 Smart Speakers 34 Production, Distribution and Technology 36 Closing Remarks 41 Chapter IV - Conclusion 42 List of References 45 Appendices 54 Appendix I - Transcripts 54 Appendix II - Ethics Form 76 Appendix III - Research Checklist 77 Appendix IV - Information Sheet 78 Page !2 of !79 Abstract Past research has widely investigated podcasting in academia and education. Some research has investigated motivations of podcasters and listeners using quantitive methods. However, little is known about perspectives of podcast users and producers with respect to technological and cultural changes in the medium. This dissertation outlines findings from interviews conducted with podcast users and a podcast producer that lays out thoughts about the medium on themes like technology, production, distribution etc. Page !3 of !79 Introduction Podcasting, an automated subscription-based system of recorded audio/video content powered by the internet, finds its origins in the early 2000s and witnessed wide adoption in 2005. This makes podcasting older than Facebook or Twitter, two very popular products of the internet age. Although, podcasting has not been able to replicate the same success as those social networking sites, it has had a few pivotal moments that left an indelible impact on the digital media industry. -
Glossary Updated – July 2014
Glossary Updated – July 2014 Ad Blocker - A software utility which can be either a browser add-on or integrated within a browser which prevents advertisements from being displayed or third party content from being served. Examples include Adblock Plus and Noscript. Leading browsers offer limited controls to block third party content including Microsoft Internet Explorer 9 and Mozilla Firefox. Address Specification (also known as: email address spec or addr-spec) - Addresses occur in several message header fields to indicate senders and recipients of messages. An address may either be an individual mailbox, or a group of mailboxes. [RFC 2822] Ad Exchange - Ad exchanges facilitate auction-based, real-time buying and serving of ads. Ad exchanges operate by serving as intermediaries between ad networks, publishers, and advertisers. Ad exchanges provide a sales channel to publishers and ad networks, as well as aggregated inventory to advertisers. Ad exchanges’ business models and practices may include features that are similar to those offered by ad networks. Ad Impression (or impressions) -Total number of times an ad (or malvertisement) is served on one or more sites. A single malvertising creative may be served to multiple users as a result of a single incident with upwards to 100,000 or more impressions, depending on the site(s) the malvertising is served on and the frequency of rotation of the ad on the site(s) and the life of the campaign. Ad Network - An ad network is a company that works with a group of Web sites and sells advertising space on their behalf. Ad networks provide an outsourced sales capability for publishers and a means to aggregate inventory and audiences from numerous sources in a single buying opportunity for media buyers. -
Apple Podcasts, Google Play, Stitcher, and Blubrry (Explained Later in This Chapter)
IN THIS CHAPTER » Finding out what podcasting is » Creating a podcast » Finding and subscribing to podcasts Chapter 1 Getting the Scoop on Podcasting ometimes the invention that makes the biggest impact on our daily lives isn’t an invention at all, but the convergence of existing technologies, Sprocesses, and ideas. Podcasting may be the perfect example of that principle — and it’s changing the relationship people have with their radios, music collections, books, education, and more. The podcasting movement is actually a spin-off of another communications boom: blogs. Blogs sprang up right and left in the early 2000s, providing nonpro- grammers and designers a clean, elegant interface that left many on the technol- ogy side wondering why they hadn’t thought of it sooner. Everyday people could chronicle their lives, hopes, dreams, and fears and show them to anyone who cared to read. And oddly enough, people did care to read — and still do. Then COPYRIGHTEDin 2003, former MTV VeeJay Adam MATERIAL Curry started collaborating with pro- grammer Dave Winer about improving RSS (which stands for Really Simple Syndi- cation ) that not only allowed you to share text and images, but media attachments which included compressed audio and video fi les. Soon after, Curry released his fi rst podcast catching client. Thus launched the media platform of podcasting. Podcasting combines the instant information exchange of blogging with audio and video fi les that you can play on a computer or portable media device. When CHAPTER 1 Getting the Scoop on Podcasting 11 0004944333.INDD 11 Trim size: 7.375 in × 9.25 in September 12, 2020 1:30 AM you make your podcast publicly available on the Internet, you are exposing your craft to anyone with a computer or mobile device and a connection capable of streaming data. -
Uncovering the Secrets of Malvertising Segura & Boyd
UNCOVERING THE SECRETS OF MALVERTISING SEGURA & BOYD UNCOVERING THE SECRETS OF We also show how malvertising, which can target multiple different platforms and take various shapes, is still largely MALVERTISING misunderstood. For instance, according to a survey by botlab.io, Jérôme Segura 60% of people think that in order for an online advertisement to Malwarebytes, USA send malware, the user has to click on the ad fi rst [4]. In the meantime, threat actors are taking on multiple identities Chris Boyd and hiding their traces thanks to clever fi ngerprinting, enabling Malwarebytes, UK adverts to act as a direct gateway to exploit kits. In this bleak context, we take a look at what the future of online Email {jsegura, cboyd}@malwarebytes.org ads may be like and how criminals will adapt in creative ways to keep milking the system. ABSTRACT AD TECH 101 Malicious advertising, a.k.a. malvertising, has evolved In order to grasp why malvertising is such a profi table and tremendously over the past few years to take a central place in effi cient way to distribute malware, it is important to have a basic some of today’s largest web-based attacks. It is by far the tool of understanding of how the ad industry works. choice for attackers to reach the masses but also to target them As a malware researcher this may feel unnatural, but let’s keep in with infi nite precision and deliver such payloads as ransomware. mind that threat actors are savvy advertisers, albeit rogue ones, The complexity and layered structure of the ad industry has who have mastered the art of abusing the ad tech industry. -
Phishing Attacks Survey: Types, Vectors, and Technical Approaches
future internet Review Phishing Attacks Survey: Types, Vectors, and Technical Approaches Rana Alabdan Department of Information Systems, College of Computer and Information Sciences, Majmaah University, Majmaah 11952, Saudi Arabia; [email protected] Received: 4 September 2020; Accepted: 27 September 2020; Published: 30 September 2020 Abstract: Phishing attacks, which have existed for several decades and continue to be a major problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple new and creative methods through which to conduct phishing attacks, which are growing rapidly. Therefore, there is a need to conduct a comprehensive review of past and current phishing approaches. In this paper, a review of the approaches used during phishing attacks is presented. This paper comprises a literature review, followed by a comprehensive examination of the characteristics of the existing classic, modern, and cutting-edge phishing attack techniques. The aims of this paper are to build awareness of phishing techniques, educate individuals about these attacks, and encourage the use of phishing prevention techniques, in addition to encouraging discourse among the professional community about this topic. Keywords: phishing attacks; phishing types; phishing vectors; phishing technical approaches 1. Introduction Phishing is a social engineering technique that, through the use of various methodologies, aims to influence the target of the attack to reveal personal information, such as an email address, username, password, or financial information. This information is then used by the attacker to the detriment of the victim [1]. The term phishing is derived from the word “fishing”, spelt using what is commonly known as Haxor or L33T Speak. -
Natiivisovellusten Ja Progressiivisten Web-Sovellusten Erot Ja Yhtäläisyydet Sovellustuotannon Ja Käyttäjän Näkökulmista
Joel Hietala Natiivisovellusten ja progressiivisten web-sovellusten erot ja yhtäläisyydet sovellustuotannon ja käyttäjän näkökulmista Tietotekniikan kandidaatintutkielma 14. toukokuuta 2021 Jyväskylän yliopisto Informaatioteknologian tiedekunta Tekijä: Joel Hietala Yhteystiedot: [email protected] Ohjaaja: Tuomo Rossi Työn nimi: Natiivisovellusten ja progressiivisten web-sovellusten erot ja yhtäläisyydet so- vellustuotannon ja käyttäjän näkökulmista Title in English: The differences and similarities between native apps and progressive web apps in software development and user experience Työ: Kandidaatintutkielma Sivumäärä: 28+0 Tiivistelmä: Tutkielmassa vertaillaan natiivisovelluksia ja progressiivisia web-sovelluksia sovellustuotannon ja käyttäjän näkökulmista iOS-mobiililaitteilla. Kirjallisuuskatsauksen ta- voitteena on käsitellä erilaisia syitä valita natiivisovelluksen ja web-sovelluksen väliltä so- velluksen suunnitteluvaiheessa. Tutkimuksen pohjalta voidaan todeta, että natiivisovelluk- set ovat pääsääntöisesti tehokkaampia ja monipuolisempia, kun taas progressiiviset web- sovellukset ovat joustavampia ja kustannustehokkaampia. Avainsanat: natiivisovellus, progressiivinen web-sovellus, PWA, sovelluskehitys, käyttöko- kemus Abstract: The thesis examines native applications and progressive web applications on the iOS mobile platform from both the developers’ and the users’ points of view. The literature review aims to explore the various reasons for a developer to decide on one of the aforemen- tioned ways to develop an app. -
The Ultimate Directory of Podcasters 670 of the WORLD’S LEADING PODCASTERS
The Ultimate Directory of Podcasters 670 OF THE WORLD’S LEADING PODCASTERS Who Can Make You Famous By Featuring YOU On Their High-Visibility Platforms Brought to you by & Page 2 Welcome to The Ultimate Directory of Podcasters! It is with great pleasure that I bring you the 2018 Ultimate Directory • The number of reviews for their show of Podcasters featuring 670 of the world’s leading podcasters. • And, other (secret sauce!) applicable variables, including whether or not the host’s name is Steve Olsher :) I have scoured the planet to compile this Directory and guide you towards those who can best help you ‘Broadcast Your Brilliance’. We then assigned a ‘score’ for each podcast based on these Inside, you will find today’s leading Podcasters, complete with criteria. Those with the highest tallies are shown on the pages their photo, show name, iTunes category and sub-category, short that follow and assembled first as the Top 10 for the ‘Overall’, or biography and, even, their email address (which we have audited ‘Parent’ category such as Education and, then, by the Top 10 for by hand to confirm that we are sharing the most accurate data each ‘Sub’ category, such as Higher Education. available!). As with any subjective process, I acknowledge that ours may have While we debated which podcasters to feature, ultimately we flaws. We likely missed more than a handful or two of podcasters chose to highlight those who consistently rank in the top of their that should have been included. respective category and, also, those who consistently rank in the That said, the 670 selected are among the world’s best and, top of their respective sub-category. -
Uncovering the Secrets of Malvertising
Uncovering The Secrets of Malvertising Jérôme Segura, @jeromesegura, Lead Malware Intelligence Analyst Chris Boyd, @paperghost, Lead Malware Intelligence Analyst Agenda •Legacy and reality behind advertising •Malvertising 101 and social engineering •Evasion techniques that Keep researchers at bay •Malvertising beyond malware (scams, fraud) 10 years ago... Early days of ad blocking •Ad overlays anger porn webmasters •They'd rather sacrifice traffic alongside the sales lost from pop- over redirects Online ads in 2016: One website, mixed messages Malvertising (n) Malicious advertising is the use of online advertising to distribute malware or scams with little or no user interaction required. Malvertising in the news… The impact •Millions of users exposed •Payloads range from ransomware to banKing Trojans Malvertising 101 Malvertising and Exploit Kits Malicious ad Redir./Gate Exploit Kit Malware https://blog.malwarebytes.com/threat-analysis/2016/01/msn-home-page-drops-more-malware-via-malvertising/ Ad Tech basics •Publisher: Website that displays ads •Creative: Short for ‘ad creative’, meaning an advert •Impression: Refers to an ad being viewed once by a visitor •Ad call: The browser request that triggers an impression •RTB: A Real Time Bidding auction for each impression •CPM: Cost per 1K impressions Why threat actors get onto popular websites • Huge traffic volumes • Pay Per Impression becomes ‘Pay Per Infection’ In one particular campaign, with just $5, threat actors were able to expose over six thousand people to malware!!! https://blog.malwarebytes.com/threat-analysis/2015/02/hanjuan-ek-fires-third-flash-player-0day/ How threat actors get onto popular websites •Inconsistent guidelines weaKen the ad industry •Profit vs security (i.e. -
Miller (Aw 6.25.18) - Macroed.Docx (Do Not Delete) 10/3/18 6:25 Pm
THIS VERSION MAY CONTAIN INACCURATE OR INCOMPLETE PAGE NUMBERS. PLEASE CONSULT THE PRINT OR ONLINE DATABASE VERSIONS FOR THE PROPER CITATION INFORMATION. 2018] THE LEGAL FATE OF INTERNET AD-BLOCKING 299 ARTICLE THE LEGAL FATE OF INTERNET AD-BLOCKING RUSSELL A. MILLER* ABSTRACT Ad-blocking services allow individual users to avoid the obtrusive advertising that both clutters and finances most Internet publishing. Ad-blocking’s im- mense—and growing—popularity suggests the depth of Internet users’ frustra- tion with Internet advertising. But its potential to disrupt publishers’ traditional Internet revenue model makes ad-blocking one of the most significant recent Internet phenomena. Unsurprisingly, publishers are not inclined to accept ad- blocking without a legal fight. While publishers are threatening suits in the United States, the issues presented by ad-blocking have been extensively liti- gated in German courts where ad-blocking consistently has triumphed over claims that it represents a form of unfair competition. In this article, I survey the recent German ad-blocking cases and consider the claims publishers are likely to raise against ad-blocking in the imminent American litigation. I con- clude that, when the American ad-blocking cases come, they are bound to meet with the fate they suffered in Germany. I argue that the relevant German and American legal frameworks reinforce a similar set of values, including respect for individual autonomy, recognition of the broad social benefits ad-blocking can generate, and an insistence that publishers accept ad-blocking as part of the free market in which they must evolve and innovate in order to compete.