By now, you’ve probably heard of Ello, the anti-Facebook social networking site founded by a handful of graphic designers. Though initially meant to be a closed experiment in network building, Ello grew popular due to its anti-advertising, anti-data mining stance. As Kyle Chayka wrote for Gizmodo not long ago, Ello also fits into the Web 1.0 trend, driven both by nostalgia for the aesthetic of decades old web design and a desire for respite from the age of massive social platforms. From Chayka’s story:
DataSift is known for analyzing massive data sets to help companies understand what consumers are saying about them, and today it’s taking a big leap forward with the launch of its VEDO FOCUS engine, which the company says is capable of accurately classifying social media data into nearly half a million topics for easy perusal.
In March 2011, two weeks before the Western intervention in Libya, a secret message was delivered to the National Security Agency. An intelligence unit within the U.S. military’s Africa Command needed help to hack into Libya’s cellphone networks and monitor text messages.
For the NSA, the task was easy. The agency had already obtained technical information about the cellphone carriers’ internal systems by spying on documents sent among company employees, and these details would provide the perfect blueprint to help the military break into the networks.
A new empirical and peer-reviewed study provides “the first evidence that online networks are able to produce social capital. In the case of bonding social capital, online ties are more effective in forming close networks than theory predicts.” Entitled, “Tweeting Alone? An Analysis of Bridging and Bonding Social Capital in Online Networks,” the study analyzes Twitter data generated during three large events: “the Occupy movement in 2011, the IF Campaign in 2013, and the Chilean Presidential Election of the same year.”
The parliament gave him several standing ovations as he accepted by video-link from Moscow. Read the rest
Security is always a game of measure vs. countermeasure and malvertising is no exception. Now that smart attackers have discovered how to twist the nature of the online advertising to their criminal ends, awareness and a number of responses are necessary to counter the threat. [ This is Part 2 of a two-part blog series […]