Tag Archive : Methods

/ Methods

“Your early vote has not been recorded,” one text message said, with a link for more information.

Other messages tell voters they are not registered, or offer unverified information about a political opponent.

Fraudulent messages like these are drawing attention as political campaigns ramp up data collection and voter targeting using their own technology to circumvent restrictions imposed by social media platforms following the Cambridge Analytica scandal.

Facebook barred apps which scraped data on users and their contacts after revelations about the now-defunct British consulting group. But in response, President Donald Trump’s campaign and some activist groups are using their own methods.

“What we are seeing is almost more potent than in 2016,” said Samuel Woolley, a University of Texas professor who leads propaganda research at the school’s Center for Media Engagement

Woolley’s team, which examined messages such as the above-referenced ones,¬†found that the Trump mobile app, and to

Read More

Protecting your computer against hacking is different from protecting it against viruses that you accidentally or unknowingly invite into your computer that then cause damage in one form or another. Anti-hack is about protecting your computer against external entities that are deliberately trying to get into your computer to cause damage and to steal from you – or cause damage. Viruses are impersonal and hacking is personal.

Anti-Hack software is now out there for sale in addition to anti-virus software. These products protect you in ways that anti-virus software does not. Following are some examples.

DoS (Denial of Service) Attacks:

DoS attacks occur when too much traffic is directed to your company website at once. The web server essentially ‘chokes’ on the amount of traffic trying to squeeze into it’s network hardware. Attack scripts are easily downloadable and you do not need to be an experienced engineer to launch an … Read More