{"id":7923,"date":"2017-06-13T05:00:01","date_gmt":"2017-06-13T13:00:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/06\/13\/news-1704\/"},"modified":"2017-06-13T05:00:01","modified_gmt":"2017-06-13T13:00:01","slug":"news-1704","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/06\/13\/news-1704\/","title":{"rendered":"Can YOU spot the fake?"},"content":{"rendered":"<p><strong>Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Tue, 13 Jun 2017 12:00:32 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/06\/dreamstime_m_84875741-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/06\/dreamstime_m_84875741-300x200.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/06\/dreamstime_m_84875741-768x512.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/06\/dreamstime_m_84875741-1024x683.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/06\/dreamstime_m_84875741-640x427.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/06\/dreamstime_m_84875741-900x600.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/06\/dreamstime_m_84875741-440x293.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/06\/dreamstime_m_84875741-380x253.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>As we <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/predictions\/2017\">predicted<\/a> in 2016, cyberpropaganda is a major growth area for cybercriminals. Per that prediction, \u201cThe rise in the Internet penetration has opened the opportunity for invested parties to use the Internet as a free-for-all tool to influence public opinion to go one way or another.\u201d Today, we know this through Wikileaks and self-proclaimed fake news websites.<\/p>\n<p><strong>Reputation Matters<\/strong><strong>\u00a0<\/strong><\/p>\n<p>Reputation is critical to organizations and individuals in our world today. Whether information is true or not sadly doesn\u2019t matter. The reality is \u2013 once information is out there, the opinion of the general public is automatically impacted. This gives fake news a great deal of power in both political and business situations, as it can heavily impact the reputation of the targeted group or organization. And we\u2019ve seen it in action \u2013 with <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cyber-attacks\/espionage-cyber-propaganda-two-years-of-pawn-storm\">cyberpropaganda<\/a> campaigns attempting to sway public opinion surrounding elections in 2016 and 2017, as well as against World Anti-Doping Agency (WADA) and other organizations.<\/p>\n<p><strong>Protecting against it<\/strong><\/p>\n<p>Trend Micro\u2019s latest report, <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/fake-news-cyber-propaganda-the-abuse-of-social-media\">\u201cThe Fake News Machine,\u201d<\/a>\u00a0provides in depth analysis of how this works, and how cybercriminals have capitalized on this huge growth area. Researchers Lion Gu, Vladimir Kropotov, and Fyodor Yarochkin dug through online marketplaces, both on the surface and Deep Web, to identify how cyberpropaganda campaigns are being sold. Fake News today stands on three pillars \u2013 social networks, tools and services and motivations \u2013 which enable the successful propagation and success of these campaigns.<\/p>\n<p>While government and social networking sites are actively working to stop the impactful spread of fake news, individuals can also take steps to impede its effect. Here are some signs users can look for to identify fake news:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Hyperbolic and clickbait headlines<\/li>\n<li>Suspicious website domains that spoof legitimate news media<\/li>\n<li>Misspellings in content and awkwardly laid out website<\/li>\n<li>Obviously edited photos and images<\/li>\n<li>No publishing timestamps<\/li>\n<li>No author, sources or data<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Read more about Fake News and how it\u2019s become such a growth are of cybercrime <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/fake-news-cyber-propaganda-the-abuse-of-social-media\">here<\/a>.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/can-spot-fake\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Tue, 13 Jun 2017 12:00:32 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/06\/dreamstime_m_84875741-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/06\/dreamstime_m_84875741-300x200.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/06\/dreamstime_m_84875741-768x512.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/06\/dreamstime_m_84875741-1024x683.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/06\/dreamstime_m_84875741-640x427.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/06\/dreamstime_m_84875741-900x600.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/06\/dreamstime_m_84875741-440x293.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/06\/dreamstime_m_84875741-380x253.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>As we predicted in 2016, cyberpropaganda is a major growth area for cybercriminals. Per that prediction, \u201cThe rise in the Internet penetration has opened the opportunity for invested parties to use the Internet as a free-for-all tool to influence public opinion to go one way or another.\u201d Today, we know this through Wikileaks and self-proclaimed&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[4503,714,10423],"class_list":["post-7923","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-cybercrime","tag-security","tag-underground-economy"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7923"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7923\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7923"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}