Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Avast_Security_News: Facebook puts temporary ban on political ads post-election
#1
Information 
Quote:
[Image: TVDumYE.png]

Plus, ransomware attackers pay to prey and students begin to feel the “digital divide”

Facebook posted in its Newsroom last week that it was preparing for the predicted chaos of the U.S. presidential election by taking certain steps and changing some of its rules, including a moratorium on political ads post-election.

“While ads are an important way to express voice,” Guy Rosen, Facebook VP of Integrity, wrote in the Newsroom post, “we plan to temporarily stop running all social issue, electoral or political ads in the US after the polls close on November 3, to reduce opportunities for confusion or abuse. We will notify advertisers when the policy is lifted.” 

Avast Security Evangelist Luis Corrons acknowledged that this is a wise move. “There are too many interests involved in the U.S. presidential election,” he commented. “We’re not just talking about candidates trying to gain voters, but also external parties hoping to influence the election and benefit from the result. Facebook knows that it’s the most popular social network and that it’s been abused in the past during election time,
so it makes sense to cut the problem at the root with a temporary ban on political ads.”

According to Rosen, other steps Facebook has taken to protect the integrity of the election include the removal of 30 networks engaged in coordinated inauthentic behavior, displayed warnings on over 150 million pieces of content, and the deletion of 6.5 billion fake accounts. Some experts worry, however, that these moves are not enough. Wired reported this week that political strategists believe determined bad actors can still find ways to target voters through Facebook, particularly when used in conjunction with other data sources. 

Ransomware groups pay for network access

Cybersecurity researchers focusing on ransomware attacks have discovered that many ransomware groups are now purchasing network access through third parties in order to accelerate and simplify their attack procedures. InfoSecurity reported that the researchers claim to be tracking more than 25 persistent network access sellers, with more materializing on a weekly basis. Network access sellers and ransomware gangs exchange goods and services on the dark web. The researchers noted that one vendor is advertising access to 36 companies for between $2,000 and $20,000. 

Hackers gain access to U.S. elections support systems

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an alert last week in conjunction with the FBI that advanced persistent threat (APT) actors were actively exploiting multiple VPN and Windows vulnerabilities in a tactic known as “vulnerability chaining.” CISA called attention to the activity because typically these kinds of attacks are used to target federal, state, and local government networks. “CISA is aware of some instances where this activity resulted in unauthorized access to elections support systems; however, CISA has no evidence to date that integrity of elections data has been compromised,” reads the report. CISA notes that the report is not comprehensive as the analysis is ongoing. 
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
AWZ Screen Recorder
AWZ Screen Recorder ...zevish — 11:05
Website X5 Go 2024.1
Website X5 Go 2024.1...zevish — 09:32
Apple's rules to allow third-party app ...
Apple has announ...alison30 — 09:28
Intel: Microsoft AI PCs need a Copilot K...
Microsoft hopes th...harlan4096 — 08:55
Synchredible 8 Professional Edition v8.2...
          Synchredib...zevish — 08:54

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
No upcoming birthdays.

[-]
Online Staff
There are no staff members currently online.

>