Cornell Chronicle: Trust in online content moderation depends on moderator

Cornell Chronicle: Trust in online content moderation depends on moderator. “More than 40% of U.S. adults have experienced some form of online harassment, according to Pew Research surveys, highlighting the need for content moderation on social media, which helps prevent and remove offensive or threatening messages. But who – or what – are the moderators policing the cyber landscape? And can they be trusted to act as gatekeepers for safe content?”

Washington Post: Musk’s inner circle worked through weekend to cement Twitter layoff plans

Washington Post: Musk’s inner circle worked through weekend to cement Twitter layoff plans. “Members of billionaire Elon Musk’s inner circle huddled with Twitter’s remaining senior executives throughout the weekend, conducting detailed discussions regarding the site’s approach to content moderation, as well as plans to lay off 25 percent of the workforce to start.”

Bleeping Computer: Chegg sued by FTC after suffering four data breaches within 3 years

Bleeping Computer: Chegg sued by FTC after suffering four data breaches within 3 years. “The U.S. Federal Trade Commission (FTC) has sued education technology company Chegg after exposing the sensitive information of tens of millions of customers and employees in four data breaches suffered since 2017.”

Institute for European Integrity: IEI Launches With NGO Watchlist Sounding Alarm About Corruptive Influence In Europe

Institute for European Integrity: IEI Launches With NGO Watchlist Sounding Alarm About Corruptive Influence In Europe . “The organizations placed on the Watchlist are identified as having deep involvement with or funding from an individual or entity that has been criminally prosecuted or sanctioned (Russia-invoked sanctions are excluded). Additionally, a separate category of watchlisted NGOs includes those with strong links to individuals with criminal allegations levelled by a European, EU, US, or UK government authority.”

Bleeping Computer: Thousands of GitHub repositories deliver fake PoC exploits with malware

Bleeping Computer: Thousands of GitHub repositories deliver fake PoC exploits with malware. “Researchers at the Leiden Institute of Advanced Computer Science found thousands of repositories on GitHub that offer fake proof-of-concept (PoC) exploits for various vulnerabilities, some of them including malware. GitHub is one of the largest code hosting platforms, and researchers use it to publish PoC exploits to help the security community verify fixes for vulnerabilities or determine the impact and scope of a flaw.”

Mathrubhumi: Indic Digital Archive Foundation launches ‘Grandhappura’ for Malayalam digital artefacts

Mathrubhumi: Indic Digital Archive Foundation launches ‘Grandhappura’ for Malayalam digital artefacts. “The inauguration of the Indic Digital Archive Foundation and the opening of the Kerala Digital Archive web portal were held at Christ College, here on Sunday. The web portal under the foundation, ‘Grandhappura’ was launched at the event. The foundation is a collection of digitised artefacts related to Kerala, Malayalam and the state’s culture.”

New York Daily News: Rogue employee hacks New York Post website with extremist hate-filled racist headlines

New York Daily News: Rogue employee hacks New York Post website with extremist hate-filled racist headlines. “It was an inside job. A hacker who hammered the New York Post with at least a half-dozen racist, misogynist and extremist headlines under the paper’s red banner on Thursday actually worked at the tabloid.”

Australian Financial Review: Who killed the social media ad boom?

Australian Financial Review: Who killed the social media ad boom?. “US advertisers are on track to spend $US65.3 billion ($101.8 billion) on networks such as Facebook, Snap and Twitter this year, a year-on-year increase of just 3.6 per cent. That is about 10 times slower than last year, according to estimates from market researcher eMarketer. The social media slowdown is such that its forecast growth rate for this year is almost the same as traditional media such as television and radio, whose audiences have been shrinking for years.”

The Conversation: In disasters, people are abandoning official info for social media. Here’s how to know what to trust

The Conversation: In disasters, people are abandoning official info for social media. Here’s how to know what to trust. “… the rise of social media has seen community groups, volunteers and non-government organisations nudging out official channels. While these informal sources often provide faster, more local information, they may also be less reliable than government sources. So what should you do in an emergency? Here are some tips for how to prepare – and how to decide who to trust when the need arises.”

Newswise: AI model using daily step counts predicts unplanned hospitalizations during cancer therapy

Newswise: AI model using daily step counts predicts unplanned hospitalizations during cancer therapy. “An artificial intelligence (AI) model developed by researchers can predict the likelihood that a patient may have an unplanned hospitalization during their radiation treatments for cancer. The machine-learning model uses daily step counts as a proxy to monitor patients’ health as they go through cancer therapy, offering clinicians a real-time method to provide personalized care.”

Associated Press: Musk tweets link to an unfounded conspiracy theory

Associated Press: Musk tweets link to an unfounded conspiracy theory. “Elon Musk on Sunday tweeted a link to an unfounded rumor about the attack on House Speaker Nancy Pelosi’s husband, just days after Musk’s purchase of Twitter fueled concerns that the social media platform would no longer seek to limit misinformation and hate speech. Musk’s tweet, which he later deleted, linked to an article by a fringe website, the Santa Monica Observer, an outlet that has previously asserted that Hillary Clinton died on Sept. 11 and was replaced with a body double.”

How-To Geek: How to Test a Suspicious Link Before Clicking It

How-To Geek: How to Test a Suspicious Link Before Clicking It. “We’ve all received strange messages either in emails or via chat apps that claimed to be from friends, family, or familiar businesses, urging us to click a link. Is there a way to check these links without clicking them so you can figure out what’s up? Just like when checking that a downloaded file is safe, there are several tests you can perform, and below we’ll go over the simplest.”

Slashgear: How To Archive All Of Your Twitter Data And Secure Your Account

SlashGear: How To Archive All Of Your Twitter Data And Secure Your Account. “Musk’s free speech absolutism has raised alarms about a rise in far-right extremist content, and research suggests that it has already started. A few influential personalities have already left, and more have indicated intentions of doing so in the near future. If you’re planning to leave Twitter, too, you should first make sure to archive your data.”