Page 1,941«..1020..1,9401,9411,9421,943..1,9501,960..»

Older People on the Internet: Keys to Safe Surfing – Telefnica

Did you know that life expectancy in Spain reached 83.3 years in 2021? This means that we are living longer and longer. And thanks to the development of information and communications technology, we lead more and more connected lives. This presents society with the challenge of providing older people with safe internet surfing.

The health crisis accelerated connectivity, which ceased to be a trend to become a reality: teleworking is now consolidated, and so is online commerce and entertainment, telemedicine, digital banking and the way we relate to our loved ones, remotely.

In 2021, as a result of the rise of remote activities, Spain became the most targeted country. According to data provided in its latest computer threat report, drafted by the cybersecurity company ESET, Spain suffered more than 51 billion desktop attacks, far more than the attacks unleashed on France (21 billion), Germany (19 billion) and Poland (18 billion). Bad data driven by the growth of teleworking across the globe.

20% of Spains population, some nine and a half million people, are elderly. In the current scenario, the number of people over 65 who have gone digital has also grown. In its latest report on the digital divide, the Unin Democrtica de Pensionistas y Jubilados de Espaa (Democratic Union of Pensioners and Retired People of Spain), UDP, points out that the regular use of the Internet by this group of people has increased in recent years, from 32.7% in 2017 to 60% in 2021.

The MayoresUDP Scale points to the exchange of messages with family and friends via WhatsApp or SMS as the main use of the internet by the elderly, with 85.1%, followed by 80.8% for people who use the internet to keep themselves well-informed. Other common activities are those related to banking and healthcare, or online shopping. However, it states that among older, less educated and less affluent people the various digital activities decrease significantly.

One of the most common complaints among the older population is the lack of technological skills and the need for face-to-face assistance or help with video conferencing, online shopping and banking. And in spite of everything, the elders have had to learn, in many cases, any way they could. Their lack of experience has made them a target for cybercriminals.

Phishing is still one of the most common cyber scams. This is the impersonation of entities, such as the bank, through e-mails. Many of these messages include links to fraudulent websites or malicious file attachments that, when downloaded, will install malicious software, or malware, thus infecting the elderly persons device.

Another common digital scam is smishing, a type of hoax via SMS, WhatsApp or voice messages. In this case, cybercriminals once again pose as well-known companies such as parcel delivery companies, electricity or banking companies, or official bodies, which instil trust. Both text messages and voice messages are intended to obtain personal information such as passwords, phone numbers, banking information, etc.

Finally, we can highlight a third danger that older people often face on the internet: online shopping. The creation of attractive fake online shops with fake products is the gateway to getting their victims money. Thus, through great offers or by copying the image of well-known brands, cybercriminals can also appropriate crucial information from our elders: passwords, personal data, etc.

In order to solve the problems that the elderly have on the internet, the National Institute for Cybersecurity, INCIBE, part of the Ministry of Economic Affairs and Digital Transformation, has promoted a series of cybersecurity awareness initiatives to help them enjoy the internet safely. This organisation aims to improve the digital skills of users over 60 years of age and their cyber-helpers or technological guides, with specific training materials that enable them to acquire the basic notions necessary to navigate the Internet with confidence safely.

The Internet Security Office, OSI, has prepared a campaign called Senior Experience in which they remind us of a series of tips that we can pass on to our elders so that they themselves can learn to identify the risks that exist on the Internet. To identify risks such as fake offers and scams, to identify reliable shopping websites, to use secure payment methods.

In addition to these tips, we must also teach older people that the best cybersecurity tool is themselves. For example, we should talk to them about the need to keep their devices operating systems and antivirus software up to date, activate two-step verification systems whenever possible, always opt for strong passwords, not give out personal information without confirming who you are giving it to, and be wary of certain types of emails where the sender or the purpose of the message is unclear.

If we know how older people surf the internet and the kind of dangers they are exposed to, we can help them to surf more safely, to be independent in the digital environment and to enjoy healthy ageing.

More here:
Older People on the Internet: Keys to Safe Surfing - Telefnica

Read More..

TikTok has been accused of aggressive data harvesting. Is your information at risk? – The Guardian

Cybersecurity experts have warned Australian TikTok users that the Chinese government could use the app to harvest personal information, from in-app messages with friends to precise device locations.

The warnings follow a report by Australian-US cybersecurity firm Internet 2.0, which found the most popular social media app of the year collects excessive amounts of information from its users.

Heres what you need to know about TikToks data harvesting, and how to keep your information safe.

TikToks data collection methods include the ability to collect user contact lists, access calendars, scan hard drives including external ones and geolocate devices on an hourly basis.

When the app is in use, it has significantly more permissions than it really needs, said Robert Potter, co-CEO of Internet 2.0 and one of the editors of the report.

It grants those permissions by default. When a user doesnt give it permission [TikTok] persistently asks.

If you tell Facebook you dont want to share something, it wont ask you again. TikTok is much more aggressive.

The report labelled the apps data collection practices overly intrusive and questioned their purpose.

The application can and will run successfully without any of this data being gathered. This leads us to believe that the only reason this information has been gathered is for data harvesting, it concluded.

Most of the concern in the report focuses on permissions sought on Android devices, because Apples iOS significantly limits what information an app can gather. It has a justification system so that if a developer wants access to something it must justify why this is required before it is granted.

We believe the justification system iOS implements systematically limits a culture of grab what you can in data harvesting, the report states.

TikTok is owned by the Chinese multinational internet company ByteDance, which is headquartered in Beijing. Founder Zhang Yiming sits at No. 28 on Bloombergs billionaires index.

ByteDance has denied a connection to the Chinese government in the past, and called the claim misinformation after various leaks suggested it censors material that does not align with Chinese foreign policy aims or mentions the countrys human rights record.

They are consistent in saying their app doesnt connect to China, isnt accessible to Chinese authorities and wouldnt cooperate with Chinese authorities, Potter said.

But he said Internet 2.0s research found Chinese authorities can actually access device data. By sending tracked bots to the app, Internet 2.0 consistently saw data geolocating back to China.

Potter has said it wasnt clear what data was being sent, just that the app was connecting to Chinese servers.

This month TikTok Australia admitted its staff in China were able to access Australian data.

Our security teams minimise the number of people who have access to data and limit it only to people who need that access in order to do their jobs, Brent Thomas, the companys Australian director of public policy, wrote in a letter. The letter was in response to questions from Senator James Paterson, the oppositions cyber security and foreign interference spokesperson. Thomas said Australian data had never been given to the Chinese government.

Under Chinas national security laws Chinese companies are, upon request from the government, required to share access to data they collect.

Youre in a different digital ecosystem when youre on a mainstream Chinese app, Potter said. And who you are may determine the level of risk you are taking.

At an individual level, the average user might not be at immediate risk, Potter said. But if youre involved in something more sensitive or discussing topics that are sensitive youve become very interesting to them very quickly.

A dissident in the Chinese diaspora community, or a critic of the Chinese government, might be extremely concerned about their personal cyber security on TikTok, Paterson said.

TikTok told a 2020 Senate committee on foreign interference on social media that any request for Australian user data would need to go through a mutual legal assistance treaty process.

Other governments also use their national security laws to gain access to user data from TikTok. TikTok publishes a half-yearly transparency report for data requests from governments.

China is not on the list of countries, but the list reveals Australian governments in the second half of 2021 made 51 requests for data related to 57 user accounts, with TikTok handing over data 41% of the time. The US made 1,306 requests for 1,003 accounts, with data handed over 86% of the time.

TikTok is now the most downloaded mobile entertainment app in Australia, with 7.38 million users over the age of 18.

If you decide to keep using TikTok, Potter suggests being specific and granular about the level of permissions shared with the app.

Set permissions manually via in-app settings and in the devices settings. Tom Kenyon, a director of Internet 2.0, also urged users to monitor those permissions regularly. In any update, they can change access to permissions. Its not set and forget.

Potter said users should continue to ignore requests for sharing information. He also urged young people to avoid using TikTok for general messaging.

If you want to share videos and look at cats, sure, go your hardest. If youre going to have a conversation with your friends about your sexual orientation, or human rights, Id be very wary.

Kenyon said young people just starting their careers should think beyond the short term.

He also urged senior public servants, public officials and members of parliament to delete TikTok and other social media. While the data already collected will not disappear from TikToks database, deleting the application will stop data collection into the future. If they are wanting to continue activity across platforms, Kenyon suggested a separate, dedicated phone.

Kenyon said that as it is an avenue for data to flow to China I absolutely think [TikTok] should be banned.

But Potter said he is very rarely in favour of bans.

I am in favour of better regulation.

Potter said Australia must be clear that we expect social media companies operating in Australia to respect our norms of privacy and freedom of speech.

They need to be clear about how they operate. And if caught lying consistently, we need to have some way of holding those companies to account.

The federal minister for home affairs and cyber security, Clare ONeil, said in a statement that the Australian government has this report and has been well aware of these issues for some years.

Australians need to be mindful that they are sharing a lot of detailed information about themselves with apps that arent properly protecting that information.

I hope it concerns Australians because it certainly concerns me.

Australian influencers have vowed to stay on the app despite concerns about Chinese data harvesting.

The Internet 2.0 report will be presented on Monday to a US Senate hearing on TikTok. With 142.2 million users in North America, the US is obviously the dominant market for this app.

I would expect TikTok will come under very hard questions about how the app operates, Potter said.

TikTok has rejected the Internet 2.0 report as baseless.

A TikTok spokesperson said: The TikTok app is not unique in the amount of information it collects ... We collect information that users choose to provide to us and information that helps the app function, operate securely, and improve the user experience.

The IP address is in Singapore, the network traffic does not leave the region, and it is categorically untrue to imply there is communication with China. The researchers conclusions reveal fundamental misunderstandings of how mobile apps work, and by their own admission, they do not have the correct testing environment to confirm their baseless claims.

With Josh Taylor

Link:
TikTok has been accused of aggressive data harvesting. Is your information at risk? - The Guardian

Read More..

Learn from these heroic saints who lived against the grain – Fox News

NEWYou can now listen to Fox News articles!

With the recent Supreme Court decision striking down Roe v. Wade, pro-life and pro-abortion factions have been jockeying to further influence our nations culture. Its hard not to notice the hateful ugliness of a visceral recoil coming from leftist activists. So why exactly does a nations culture matter? Whats at stake? Why does choosing to live a life of virtue, or vice, even matter?

With abortion and many other issues, the world is in a massive state of confusion. Violence is increasing. Order is breaking down. Everyone knows that there is something wrong afoot. Everything that is good these days is under attack. Whats going on, and what can everyday people do about it?

In Against the Grain: Heroic Catholics Through the Centuries I tell the story of 21 saints from 21 centuries focused on 21 virtues and why virtue matters especially for our time. Better understanding individuals who lived as shining examples, as signs of contradiction, who did what was right and not what was necessarily always popular. Against the Grain is a summons to heroic virtue, to sainthood, for all. To be a saint is to change the world one soul at a time.

When the world tilts toward crazy, the desire for the heroic increases. Americans love superheroes. Feel good stories about good defeating evil. Our rational brains inform us that while comic book and movie superheroes arent real, were fascinated by them nonetheless. Why is that? Instinctively we love our military, police, firefighters, medical and everyday heroes. Heroes give us solace, energy, and hope.

MARIO LOPEZ SHARES PHOTOS OF HIS SON'S FIRST COMMUNION

Details of St Savior in Chora church, known as Kariye in Turkish, in Istanbul, Friday, Aug. 21, 2020. Turkey on Friday formally converted former Byzantine church, St Savior in Chora, into a mosque, a month after it similarly turned Istanbul's landmark Hagia Sophia into a Muslim house of prayer, drawing international rebuke.(AP Photo/Emrah Gurel)

Catholics know that those who have lived lives of heroic virtue, our Saints, were not fictitious, but real. We look to them to imitate them as they give us true solace, energy and hope. Living lives of heroic virtue is what is required to fix our broken families, nation, and church.

Dr. Jordan Peterson recently asked Church leaders to start asking more of young people. He spoke of "making big demandsbig asksof her members. By so doing they would get a heroic response, heroic involvement, and heroic dedication. Do we prefer short-term safety, affiliation or status over long-term freedom, belonging and heroism?"

Against the Grain, while focusing on heroic saints, is a highly relatable book as it also focuses on struggles and weaknesses. Against the Grain shows the path the saints walked to get to the point of strength. And thats the example that you and I need. Where we too say, "Why not me?"

Against the Grain is a roadmap. It is a message to take action. An action of resistance to the globalists "Great Reset," "Great Transition," and to the anti-Christian elites.

CLICK HERE TO GET THE OPINION NEWSLETTER

People Praying in a church

Against the Grain is also a life preserver. More to the point, its an eternal life preserver. When the culture is swamping your boat with garbage and nonsense, living a life of greater virtue, perhaps even heroic virtue, is an eternal life preserver.

We are called to be extraordinary in the ordinary. As the world whips itself into further frenzy, confusion, and madness, the cross is the answer. Saint Bruno, founder of the Carthusians, said in the 11th century, "While the world changes, the cross stands firm." Stand firm with the cross.

Against the Grain is a playbook for the good guys to stop playing defense and start playing offense. If you have been conditioned to go with the flow of our immoral culture, this book is not for you. If you live as a sign of contradiction amidst our coarsening culture, and are looking to live a life of greater virtue, perhaps even heroic virtue, be fortified with Against the Grain.

Against the Grain is a book that will change the way you see your faith and your relationship with humanity. Its about an epic struggle and mostly, about our future. As Saint John Vianney said, "The saints did not all begin well; but they all ended well. We have begun badly; let us end well, and we shall go one day and meet them in heaven."

CLICK HERE TO GET THE FOX NEWS APP

(Photo by Wathiq Khuzaie/Getty Images) (2005 Getty Images)

Against the Grain is for culture-warrior, patriotic, serious, faithful Catholics, and people of all faiths interested in the Catholic story. This story isnt just about our forefathers. Its about each persons personal quest to find the courage to be truly faithful in a world where Catholicism is often unwelcome.

Dont wait for Calvary. Instead, move forward with moral confidence. If need be, heroic confidence. Step into the breach. Stand out. Go against the grain.

Saints are heroes. Be one.

Here is the original post:
Learn from these heroic saints who lived against the grain - Fox News

Read More..

From The Mailbag – The American Conservative

Believe me, I hear you loud and clear about the awful new comments policy, which has pretty much shut down this blog's comments. I believe the Mothership is working in some way to fix this. In the meantime, if you have something substantive you would like to say, email me at rod -- at -- amconmag -- dot -- com, and I'll consider posting your words. I won't use your name unless you explicitly ask me to. Be sure to leave clear instructions if you want me to edit out anything.

A reader writes:

Just back from a week at summer camp as an adult leader for my son's scout troop. My kids live in sort of a conservative catholic cocoon, we do a few things "beyond the pale" (in the sense of the old border with Scotland). For many years scouts has been like baseball: kept safe more by inertia than by anything else.

Now that "scouts BSA" (formerly the Boy Scouts) also has girls, cross-dressing can actually be harder to see at first glance. Someone walks past, girl or boy? Maybe it's a good thing there are girls, my son is often oblivious to these things.

So, I know I'm not reporting anything crazy, nor unexpected. Of course, now that American youth are on a trans / genderbender kick, of course that streak will infect the scouts. How could it not? Years ago,scouts BSA was officially unwelcoming to LGBT scouts and leaders, so there were some constraints - that's all to the wayside now. Now the only thing holding it back is who runs scouting... moms and dads mostly. But you know how that is. If there's no express counter-cultural rule, you know which way this goes.

So among the camp counselors this year, there were a good 2-4 who didn't, shall we say, dress according to their biology.

What do you do as a parent? Do you say something on the survey? As if that would accomplish anything (other than labeling you as a hater).Do you seek after authority, to try to rein this in? But could you do it, even if you tried?

Do you encourage your son to be a counselor when he gets older? Would you send your kid off to room with folks like that for a couple months? Sacrifice your son on that alter-altar? A really good boy from our troop is there this summer as a counselor... I will pray for him.

So another institution is taken over, kids lose one more place where they can be a kid, and you have (sadly) one more example of why we need a Benedict Option.

Here's a letter from a Reformed pastor:

I read your blog today about the feminization of Christianity and the need to man up.Thought provoking for sure.Then I read your Substack about the Reformed Church in the Netherlands and I was surprised to see that my thoughts were somewhat tracking yoursHere are some observations in no particular order.1. Hyper masculine church leadership often results in catastrophic disasters. Men who cant control their sex drives, (Ravi long list here Canadas Bruxy Cavey is the most recent addition to this hall of shame) or their need for power (James MacDonald) or their competitive spirit (Driscoll) destroy what they build in the most fantastic ways. Jesus is aware of this as he commands the path of cross bearing, suffering and models rhetorical poise in the face of intense attack. Be ready to die for God, for truth, and for your neighbour. But first, you die to yourself. 1.5 Hyper masculine Christianity is Islam. Rules, oppression of women, violence, strict discipline, little to no grace. Hyper masculine Islam is ever waiting in the wings and is actively recruiting. They will tell a man to fight and shed the blood of the enemy. The Christian idea that the fight is against powers and principalities and ultimately against the evil within is in competition with those eager to find warriors to battle external foes who can only kill the body. 2. When I grew up all the men went to Mass on Saturday nights. We were Protestant and my dad would often note that the Catholics had the most men in church. Why? Maybe it was the ritual. Maybe it was the fact that the church with its huge bloody Christ painted on the wall, the focal point for all to see, created the sense of death, and with it the sense of adventure the spurs a man to be the best. Or maybe thats just me, from a strict Calvinist iconoclastic upbringing being shocked by such an image. I can still see that Christ arms out stretched with a grey bearded God the father above him holding up his arms with his and a dove above them both. Blood and water being collected from his side into a communion chalice. No mystery here when it came to theology. Blood, death, God, Christ. A church that still could pack the place at 11:30pm on Christmas Eve. When we Protestants lost the visual arts, we started to lose everyone.3. Bible study with a group of young men the other night. Our discussion of the Virgin Birth devolved into a discussion about the mysterious birth of Anakin Skywalker. They knew more about George Lucas and his parody of the virgin birth than the story in Matt 2 and its theological implications. You are right on about Myth, men crave myth, and when they cant find it at church they will settle for light sabres in a universe far far away. 4. Protestants kept the Bible though. A Protestant understands what is going on. The Orthodox have the liturgy, the Catholics the dogma, the Protestants insist on the Bible to keep the others honest. :). But we are losing the Bible now. My denominational seminary continues to weaken its Greek and Hebrew requirements. Apparently you dont have to sweat and struggle through difficult course work to be a pastor anymore. Men looking for a challenge need not apply. Makes me mad. I chose Calvin Seminary because an old professor of Old Testament looked at me over his glasses and said Seminary is school and it is difficult. As it should be, my 25 year old self thought. I wish I could say that my seminary education was almost as rigorous as an MD, should be more rigorous. The doctor can only kill the body, a bad pastor wrecks a lot of souls. My seminary also actively recruits women, an odd thing since our 30 some years of women in office has yet to yield much more than 10% of pulpits as actually being available to women. The congregations, not a bishop, choose and they tend to be conservative. 5. That said, do I want to fight the trans issue? In some ways we are like King Theodon when Gandalf says War is upon you. There isnt a choice anymore. Ive got public school teachers telling me they have to lie to parents to hide a kids trans identity. Ive got members who work for large organizations that have to promote the June agenda, as part of their jobs. I meet with them, we talk about it. Is this fighting? I am not sure. People dont come to church to hear what is blasted at them 24 hours a day everywhere else. I hate having the culture dictate what I have to talk about. But, the war is upon me and an enemy gets a vote. It is foolish to ignore an enemy. What does fighting look like? -I have a Bible study for broken drug addicted young men.-our church keeps men at the upper levels of leadership, even though not all agree with this.-we have an explosion of little children and growing young families. Where will we be in five years? StrategyI am not sure how to fight.6. Many people dont get it. Things that are obvious to me are not obvious. We are masters at adapting to bad circumstances, and often blind to how bad those circumstances really are. Iniquity is probably the right word, avon in Hebrew, crooked path, lost way, falling in the pit one dug, exchanging truth for lies and losing all sense of truth its the same problem.7. Why did Jordan Peterson succeed? I wish I knew.

Another reader writing about men in the church:

This is in regard to your second "men in the church" post.That article you wrote about Anna, the young Catholic woman who had been struggling to find a husband, has stuck with me since you published it in 2019. I am an evangelical man living in a "seminary town" who attended the seminary off and on over the past eight years, finally graduating last year. The seminary environment had a similar gender imbalance to what Anna speaks of in her complaint, but reversed -- there were far more men than women at the seminary. This was to be expected, it being the flagship seminary of a theologically conservative evangelical denomination who believes only men should be ordained as pastors. But I found it to be the worst possible environment to try to date in. The deck was stacked against me. I was "competing" against hundreds of men far more godly (and handsome, charming, intelligent, etc.) than myself, and the attractive single women at the seminary had their pick of the litter.The churches, on the other hand, were a bit different. As with most evangelical churches, the ones I attended did have more single women than single men. However, I now, like the reader you quote at the beginning of this post, attend an ACNA church. What drew me to the Anglican tradition is what draws most young men to more liturgical traditions -- the beauty and seriousness of the liturgy and the gift of an actualpath to walkin terms of spiritual discipline. Unfortunately (but also fortunately, because I love my church!), I now attend a church where there are currently preciselyzerosingle women in attendance, apart from one or two who appear to be straight out of high school, which is a bit too young for this 32-year-old.I actually asked my pastor about this when I first met with him after beginning to attend the ACNA church. I noted semi-jokingly that I was concerned about never finding a wife if I stopped attending a baptistic evangelical church, since most of the single Christian women in town were of that ilk. He assured me there were plenty of Anglican women, and even joked that maybe I could get a Catholic girl to make the jump to Anglicanism! Well, these Anglican women must be in other congregations in other cities, because after six months of attending, I haven't seen any at my church. I say this not out of bitterness or discontent. I am merely noting a curious fact.(There is a saving grace for me, though, because I work at a fairly large classical Christian school, which sees an influx of young, single female teachers each year. There's the awkwardness of navigating workplace romance, but at least there are options. I tried the online dating thing and found it to be largely a waste of time, and the platforms designed to be addictive. I can't see myself ever doing online dating again, though I know it works well for some people.)

All of this is to say that more and more young men are going to realize, when they jump ship to more liturgical churches, that their pool of potential mates rapidly shrinks. (Although perhaps this is not true for Catholic churches, if Anna's Australian experience is anything to go by.) If they are coming out of evangelical circles, they might be able to find a woman willing to make the jump with them (especially if, like my ACNA church, their church allows them to be a member and still hold to believer's baptism). But they need to prepare for that reality. I think, too, that pastors and other leaders in these liturgical churches need to be prepared to play matchmaker across their networks to find these eager young men wives who are similarly committed to liturgical Christian living and serious discipleship. It's an old-school approach, but what other option is there, especially for men unlike myself who don't also work in a Christian environment?

Reader Joan in Mass. writes:

for the first "Where Are The Men?" postFor all the digging Podles does into the beginning of the feminization of Western Christian congregations in the High Middle Ages, I'm surprised that he didn't mention the most famous change from that time, the one still being debated: mandatory priestly celibacy. It altered the appeal of the priesthood, ensuring that a very different sort of individual would choose that path. I don't know much about organizational dynamics, but I do know one thing from my years as an employee: the personality of the individual in charge sets the tone, both the CEO for the organization as a whole and the first-level supervisor for the team or sub-unit. At the top of the church, elite families still placed their younger sons in positions of power, tolerating mistresses and secret families, but at the parish level, the priest was more and more likely to be the sort who had never fit in with his male peers and who still couldn't relate to them. Thus, without changing anything else, the church became less welcoming to normal men, simply because the guy in charge was not one of them. And then the divide was baked into the culture and endured even after Protestants restored marriage for the clergy.

In response to your correspondent in the ACNA, I have heard before that religious groups oriented around addiction recovery tend to be overwhelmingly male because addiction is an overwhelmingly male problem. Unfortunately, a history of addiction, especially addiction to something illegal, is a huge red flag for large numbers of women, especially women who have never struggled with addiction themselves. A guy has to get a long, long way from a past like that before law-abiding women will start to trust him.

Here is a letter Harvard's diversocrats sent to faculty and staff:

Subscribe Today Get weekly emails in your inbox

"Additional demographic categories"! Well, never let it be said that these people working these bullshit jobs are just laying around.

Continue reading here:
From The Mailbag - The American Conservative

Read More..

The Barstool Bros’ Split Over Abortion Could Determine the Future of the GOP – POLITICO

Last summer, I wrote about how Portnoys particular brand of transgressive boorishness served as an inspiration to Republican politicians eager to capitalize on the backlash to newly established progressive social norms around things like gender pronoun usage and diversity, equity and inclusion practices. But that alliance was never ideological it was aesthetic. To a certain kind of secular, mostly apolitical Barstool bro, the party of evangelical pro-lifers might not have been an ideal fit, but it was certainly more appealing than the party of woke scolds and stuffy bosses across the aisle.

Now that the Supreme Court has handed social conservatives their most significant ideological victory of the modern political era, those voters will have to choose: Is it worth giving sanction to an overtly religious, mostly unpopular political project simply to own the libs? Portnoy himself explicitly says no. But cultural backlash is as unpredictable as it is powerful, and its place at the heart of the modern GOP means that how a particular type of independent, attitudinally conservative voter responds could shape America for years to come.

To look at the empirical evidence in so much as it exists around opinion on abortion rights, one might think that Republicans victory over Roe is somewhat Pyrrhic. The most recent data from the Pew Research Center, collected at the beginning of July after the Dobbs decision, shows that 57 percent of the population disagrees with the decision itself (including a not-insignificant 29 percent of Republicans); the only group expressing overwhelmingly strong approval is white evangelicals. Sixty-two percent of Americans say abortion should be legal in most or all cases.

But dig deeper into the data and youll find that support for abortion varies considerably based on the duration of pregnancy, especially taking into account voters geographic distribution. There are also, of course, the inherent limitations of public opinion polling, as well as the relative rarity of single-issue voters (among whom anti-abortion voters outnumber their counterparts). Its not quite accurate to say the GOP has summarily alienated an electorate that otherwise seemed prime to embrace it in this falls midterms.

So one might look to another indicator, albeit one lacking the veneer of empiricism that polling maintains: The opinions of thinkers and leaders in the conservative movement. What actual politicians say is unreliable, as beholden as they are to pesky primary voters and wealthy, ideological donors. What about those responsible for curating the vibes of the modern conservative movement?

At the beginning of June, the National Review fellow and social-conservative wunderkind Nate Hochman wrote an op-ed for the New York Times titled What Comes After the Religious Right? In it, he expanded on the somewhat declinist view of the conservative Catholic writer Matthew Walther, who coined the term Barstool conservative in a 2021 op-ed for The Week writing that, While the old religious right will see much to like in the new cultural conservatism, they are partners, rather than leaders, in the coalition. Hochman argues that although a figure as non-pious as Trump (who could plausibly claim the mantle of the Barstool president) might have empowered social conservatives, theyre too much of an electoral minority to succeed without their comparatively libertine coalitional partners.

Hochmans insight invites a similar reflection from the other side of the aisle. Once upon a time, as the writer Matt Yglesias recently pointed out in response to Portnoys pro-Roe stance, chauvinistic bros were reliable Democratic voters, who made common cause with realpolitik-ing feminists willing to overlook the Clinton-era partys affective cultural conservatism in exchange for political wins. Both were opposed to the Moral Majority-era sanctimony of the Reagan-Bush GOP, the ethos of the alliance perhaps best summed up by a notorious quote regarding Clinton from the former Time White House reporter Nina Burleigh: Id be happy to give him a blowjob just to thank him for keeping abortion legal. I think American women should be lining up with their presidential kneepads on to show their gratitude for keeping the theocracy off our backs.

For various reasons beyond the scope of this essay, the salience of cultural politics has increased in American life to an extent that makes that alliance impossible. Conservative thought leaders now find themselves at the same crossroads liberals once did: What price are they willing to pay what are they willing to sacrifice, or excuse to keep such fickle, secular, Portnoy-like independent voters in the fold?

What are conservative thought leaders willing to sacrifice, or excuse to keep such fickle, secular, Dave Portnoy-like independent voters in the fold?|Michael Reaves/Getty Images

As the GOPs most reliable and motivated voting bloc, the anti-abortion movement is clearly not going anywhere. To the chagrin and fear of liberals, and the hope of the would-be New Right, theres some evidence that they might not have to. Looking at the replies to Portnoys initial post-Roe tweet, alongside the criticism from hard-right figures like Dan Bongino (as well as Hochman himself), one can see a slew of comments from average, non-blue-check-sporting Barstool fans, protesting that all the Supreme Court did was let it be a state issue, or that he should simply stick to sports.

This is where Barstool per se ceases to be a useful framework through which to understand the shifts occurring in American politics today. (As with any brand with as massive a reach as Portnoys, its fans are more ideologically diverse than a liberals snap judgment would assume.) The angst inspired by Portnoys pro-abortion rights turn reflects a much broader phenomenon: Just as secular and religious GOP voters are split, theres an even narrower division among those who are simply alienated by the modern left and those who are outright anti-feminists, especially among young voters.

The anti-feminism of todays young conservatives takes a few different forms. There is, of course, the outright hate spread on forums like 4chan and by trolls like Nick Fuentes; the casual, fratty misogyny of more mainstream figures like Trump White House aide Garrett Ziegler, who in a live streamed rant after his Jan. 6 committee testimony called his female former coworkers thots and hoes; and the faux-erudition of New Right leaders like Sen. Josh Hawley, who in a keynote address to the National Conservatism Conference decried the lefts attack on men in America. (Its not just America, either: In South Korea, youth anti-feminism helped propel a conservative president to the Blue House.) Young anti-feminists see a world where women are at least notionally more empowered than ever, yet no one seems to be happy about it. They look to the past for solutions in lieu of inventing new ones for the moment.

And there are plenty of historical examples, both religious and secular, to draw from. In her 1991 book, Backlash: The Undeclared War Against American Women, the feminist writer Susan Faludi described a taxonomy of anti-feminist reaction to the advances of the Equal Rights Amendment era, from Christian leaders like Paul Weyrich who promised to overturn the present power structure of the country to the quasi-paganism of the poet Robert Bly, who encouraged real men to reclaim their cultural birthright by psychologically isolating themselves from women. Faludi sums up their shared philosophy as the belief that the very steps that have elevated womens position have actually led to their downfall.

One might wonder what Faludi, in an era where Weyrich and Bly have inspired successors in figures like the (now-disgraced) megachurch pastor Mark Driscoll and the Canadian psychologist Jordan Peterson, would have to say about the backlash to womens more recent advances. To borrow a rhetorical move from Woody Allen, whom Bly especially hated, we dont have to wonder; I happen to have Ms. Faludi right here: Writing in the New York Times in response to Roes overturning, she argues that feminisms growing entwinement with celebrity culture is a primary culprit in making it more vulnerable than ever to a more pernicious backlash, one that has never relented, one that has brought us the calamity of the Alito draft opinion.

This is why social conservatives find themselves at a moment of not just dog-that-caught-the-car peril, but potential promise. The Courts ruling was only made possible by the combined forces of secular conservatism, via Trumps mass heterodox appeal, and the decades of concentrated effort by a minority of religious activists. Like with Weyrich and Bly, or Driscoll and Peterson, anti-feminism can take many forms and have many motivations, but the basic ressentiment it taps into transcends religion, class or partisanship, and is stubbornly persistent. By subsuming life-or-death social issues under the auspices of Lean In moments and social media slap downs over whether Taylor Swift is or isnt a feminist, as Faludi wrote, liberals and feminists have risked erasing the distinction in the publics mind between serious material outcomes and such symbological slap-fights.

That possibility conjures a world where arguments about womens health outcomes, or whether theres a feminist case against abortion, or over pro-family Republican economic policies might become immaterial as abortion becomes an entirely different, more recognizably modern kind of culture-war issue. We simply dont know yet whether the Barstool cohort of the modern GOP will look around at a post-Roe world and decide their party has gone too far. But if they dont, and Trumps coalition holds, it will be the most powerful symbol yet of Americas transition to a symbolic mass politics of cultural grievance.

Those politics still can have very real policy consequences, as millions of women in red states are now discovering. Improbable as it might seem, whether or not said consequences endure or even spread might depend on what occurs in the hearts and minds, and on the ballots, of men like Dave Portnoy.

See the rest here:
The Barstool Bros' Split Over Abortion Could Determine the Future of the GOP - POLITICO

Read More..

AWS Server Chip Becomes a Not-So-Secret Weapon Against Microsoft, Google – The Information

For the past decade, Amazon Web Services has maintained its edge over Microsoft and Google in selling cloud computing services by speeding up its technology and lowering prices. Over the next 10 years, a key advantage will be its Graviton microchips, which AWS developed in-house to power apps on the internet or to help customers train machine-learning models.

Six AWS customers told The Information that cloud servers using Graviton processors consume less power and can deliver higher speeds than servers made by incumbents Intel and AMD. The Amazon customers said they saved 10% to 40% on computing costs by renting Graviton servers. Twitter, Snap, Adobe and SAP are among the customers of Graviton servers, which became a multibillion-dollar revenue business only three years after it launched, according to a person with direct knowledge of the figures. Since Amazon in May debuted a more cost-efficient third generation of Graviton chips, rivals are feeling even more pressure to catch up.

Go here to see the original:
AWS Server Chip Becomes a Not-So-Secret Weapon Against Microsoft, Google - The Information

Read More..

The Promise and Peril of Cloud Computing – The Hudson Reporter

By Carl Mazzanti, president of eMazzanti Technologies in Hoboken

Small, medium, and large businesses are increasingly embracing cloud computing, which offers the ability to access computing services over the internet. The benefits of moving to the Cloud are significant. These range from reduced hardware expenses to ease of administration. In more detail, businesses moving to the Cloud can generally avoid upfront and ongoing costs of purchasing and maintaining certain assets including servers, storage, databases, networking, software, analytics, and intelligence since cloud providers set up and maintain the necessary hardware and software on data centers over the internet.

When considering moving to the Cloud it is helpful to use an experienced Cloud services provider. Cloud providers can offer fast, reliable application updates with greater flexibility, and enable businesses to only pay for the cloud services they use while with the flexibility to add new features as needed.

Cloud providers can easily scale a clients computing power or software up or down as needed. The scaling ability was dramatically illustrated during the first months of the COVID-19 pandemic when large gatherings were banned. The NFL was able to tap its cloud computing partner to rapidly scale up its resources, which meant the league could safely and efficiently conduct virtual drafts, and more than 100 live feeds were running simultaneously for the following three days.

However, all Cloud providers are not equal. Business owners should trust but verify a potential or existing cloud provider. Why? Because just as Willie Sutton famously said, Thats where all the money is, when asked why he robbed the banks during the Depression. Cloud services today are just like the banks with the money- The cloud is where all the data is. Even a well-meaning cloud provider may unintentionally serve as a honeypot for cybercriminals who can crack a single digital safe and access reams of potentially valuable passwords, personally identifiable information and other data.

In addition to the scalability and potentially reduced upfront capital costs, there are plenty of reasons to go with an experienced cloud provider. A cloud computing environment can offer improved reliability with efficient data backup, disaster recovery, and business continuity services; data will be mirrored (or copied) in multiple sites on the cloud providers network. And reputable cloud providers can offer robust policies, technology, and controls that help protect data, apps, and infrastructure from potential threats.

Business owners should be aware, however, that all not all cloud providers are equal, and should engage in a trust but verify approach to vet a potential or existing cloud provider. This would include verifying a cloud providers claims, ensuring the provider has the ability to meet the security and other needs of the business.

A good way to begin is to scour the providers contract and confirm exactly what the provider is promising. Will they move your information into the cloud and secure it? Or will they just move your data? A contract that limits a guarantee to a data transfer is like hiring a moving company to transport your household goods, only to find it all dumped on the lawn of your new house because the agreement did not state they would place it inside the house.

Another important step involves understanding who is verifying the providers claims. For example, a company that performs services should not be the one that checks them the best practice is when a qualified independent third party reviews the providers cyber-practices.

It is also important to consider whether a providers cloud architecture, standards, and services align with your business workload and management preferences, and whether a significant amount of re-coding or customization will be necessary to prepare your business legacy workloads to mesh with the cloud providers platforms.

Cloud providers will say they can safeguard your sensitive data but that claim is only valid if their cyber-defenses are robust. One way to validate this is to have an ethical hacker test the providers defenses, but a more realistic approach involves inquiring about the providers network of secure data centers. A provider that maintains multiple regularly upgraded datacenters will likely offer more benefits including the latest generation of fast and efficient computing hardware, reduced network latency for applications, and larger economies of scale as opposed to a provider that operates only a single corporate datacenter.

There is no question that cloud computing can offer significant benefits to businesses of all sizes but selecting the right one, and successfully migrating your data may involve some time and work. Businesses that work with a trusted IT services consultant and prepare by gaining a thorough understanding of the issues involved can make the process smoother, though, while ensuring that their data is efficiently migrated and safely maintained.

Read more here:
The Promise and Peril of Cloud Computing - The Hudson Reporter

Read More..

Chinese TikTok owner increased U.S. lobbying spending by 130% this quarter – CNBC

Rafael Henrique | Sopa Images | Lightrocket | Getty Images

TikTok's Chinese parent ByteDance had its biggest lobbying quarter ever, spending more than $2.1 million in the second quarter to lobby the U.S. government, according to its disclosure filed Wednesday in a federal database.

That represents a 130% increase from ByteDance's spending the previous quarter and marks the first time it's topped $2 million in a single quarter since it first registered lobbying disclosures in 2019. The company spent about $4.7 million on lobbying in all of 2021, according to the disclosures.

The company lobbied on a variety of issues. One piece of legislation it discussed was the American Innovation and Choice Online Act, the key antitrust bill that would prohibit dominant tech platforms from favoring their own offerings over those of rivals that rely on their services. It also lobbied on the two versions of a large funding bill aimed at boosting American competitiveness against China, a handful of online privacy bills, a defense spending bill and a bill to ban TikTok from Department of Homeland Security devices.

ByteDance engaged with both chambers of Congress during the quarter as well as executive agencies including the departments of Commerce, Defense, State and the Executive Office of the President, according to the filing.

The lobbying disclosures don't elaborate on what exactly ByteDance was pushing for and both the parent company and TikTok did not immediately respond to CNBC's requests for comment.

TikTok's Chinese ownership has complicated its relationship with Washington as many lawmakers are skeptical about how secure it can keep U.S. user data while believing that Beijing could compel ByteDance to hand over information.

TikTok has said it does not store U.S. user data in China and that it would not hand over such information to the Chinese government. But lawmaker skepticism has persisted and was recently reignited by a BuzzFeed News report that found Chinese-based ByteDance employees were able to access nonpublic U.S. user data. A TikTok spokesperson told BuzzFeed at the time it continuously works to validate its security standards including through independent third-party tests.

Shortly before that article was published last month, TikTok released a blog post announcing that through its partnership with Oracle, it's "changed the default storage location of US user data" so that "100% of US user traffic is being routed to Oracle Cloud Infrastructure."

"We still use our U.S. and Singapore data centers for backup, but as we continue our work we expect to delete U.S. users' private data from our own data centers and fully pivot to Oracle cloud servers located in the U.S.," the company added.

Subscribe to CNBC on YouTube.

WATCH: Lawmakers grill TikTok, YouTube, Snap executives

Excerpt from:
Chinese TikTok owner increased U.S. lobbying spending by 130% this quarter - CNBC

Read More..

Three Key Challenges That Impede True Multi-Cloud Success Featured – The Fast Mode

Successfully implementing a multi-cloud strategy means overcoming the complexity of integrating and managing disparate solutions and standards across multiple clouds.

No one will deny that enterprise embrace of the cloud has been swift and sure. Cloud offers flexibility and scalability, efficient collaboration, business continuity, and much more.

Today, organizations looking to create an even more dynamic network are transforming their cloud landscapes once again. A new enterprise strategy a multi-cloud, or hybrid cloud, approach is quickly gaining a foothold in organizations of all sizes.

The fact is that organizations are increasingly mixing it up and using multiple cloud computing and storage services in a single network architecture. According to a recent Foundry (formerly IDG) survey of 850 IT decision-makers, only 16% reported that their organizations relied on a single cloud provider for their public cloud deployments.

Whether an organization is using more than one public cloud to deliver business services to its users, combining public and private cloud, or co-mingling multiple clouds with on-premise solutions, the benefits of a multi-cloud strategy are clear. Enterprises gain maximum flexibility to choose providers and cloud environments that meet a variety of organizational and customer needs while, at the same time, lessening the chance of vendor lock-in and ensuring better business continuity.

Multi-cloud ecosystems are complex, so they come with a wide range of challenges. Some of the most complex ones are related to network architecture and what happens when an organization attempts to take advantage of disparate solutions and standards across multiple clouds. Consider the following:

Despite the challenges, forward-looking organizations with a digital-first approach continue to view investment in cloud transformation as a strategic enabler for their businesses. With this mindset, they are able to develop multi-cloud capabilities that actually move the needle.

To be honest, most companies reaping the benefits of a multi-cloud or hybrid cloud strategy recognize that they cannot do it internally. They understand that putting in place a multi-cloud management platform not only smooths the way for an effective digital transformation but also makes sure everything operates effectively post transformation.

The right platform does all the heavy lifting via operational tools that bring together every segment of the cloud and simplify essential areas like connectivity, network governance, production, analytics, automation, and more.

The future of cloud is multi-cloud. Setting your organization up for success now with the right infrastructure and cloud management platform puts you a step ahead of those still just thinking about it.

See the article here:
Three Key Challenges That Impede True Multi-Cloud Success Featured - The Fast Mode

Read More..

Cato aims to bust cyber myths as it extends network protections – ComputerWeekly.com

As secure access service edge (SASE) specialistCato Networks burnishes its cyber credentials with the addition of multiple features to its platform, the companys senior director of security strategy, Etay Maor, has urged users to challenge some of their preconceptions around security, using data drawn from Catos global network to counter some established cyber truths.

In June 2022, Cato became the first SASE supplier to add network-based ransomware protection to its platform, combining heuristic algorithms that scan server message block (SMB) protocol flows for attributes such as file properties and network or user behaviours, with the deep insights it already has into its network traffic from its day-to-day operations.

The algorithms were trained and tested against the firms existing data lake drawn from the Cato SASE Cloud which holds over a trillion flows from Cato-connected edges.

The firm claims this will let it spot and stop the spread of ransomware across an organisations network by blocking SMB traffic to and from the source device to prevent lateral movement and file encryption.

Speaking to Computer Weekly, Maor, who joined Cato from IntSights, and is also an adjunct professor at the Woods College of Advancing Studies at Boston College, described a Black Basta ransomware attack to which he responded, in which the victim an unnamed US organisation could have benefited from this.

When he gained access to the victims security logs, Maor found that all the information that a ransomware attack was incoming was there, the security operations centre (SOC) team had just not been able to see it.

I know its cool to get to sit in front of six screens, but what SOC analysts are trying to do is gather so much information and put it all together, so I understand why stuff is missed, he said.

In this case, it was remote desktop [RDP] to an Exchange server. Yes, they said, but that Exchange server doesnt exist anymore so why attack a server thats not there? So I had to introduce them to ransomware as a service [RaaS].

What happened was someone else who attacked them sold their network data to someone else who wrote a script to automate the attack. They werent there for weeks, they were there for a minute, they didnt know the victim had changed their Exchange server, but got lucky somewhere else.

So if you can see east-west traffic, like an attempt to connect to a server that isnt there, that should be a red flag to the SOC, he explained. We created our heuristic algorithms to look for these quirks.

Maor said he wanted to explode the myth favoured by presenters at security conferences that attackers need to get lucky only once, while defenders need to get lucky all the time.

When you look at MITRE ATT&CK and see how attackers operate, you soon see that saying is the opposite of the truth. Attackers have to be successful at phishing, gaining an endpoint, lateral movement, privilege escalation, downloading malware payloads, et cetera.

You actually realise that attackers need to be right all the time, but defenders need to be right only at one point to protect, defend and mitigate, he said.

Cato is now going further still, adding a data loss prevention (DLP) engine to protect data across all enterprise applications without needing to implement complex and cumbersome DLP rules. It forms part of Catos SSE 360 architecture and is designed to solve for what the firm describes as the limitations with which traditional DLP solutions are fraught.

For example, legacy DLP may have inaccurate rules that block legitimate activities or, worse still, allow illegitimate ones while a focus on public cloud applications is leaving sensitive data in proprietary or unsanctioned applications exposed.

Added to that, investment in legacy DLP solutions does not help provide protection from other threat vectors.

Cato believes it has these problems licked by introducing scanning across the network for sensitive files and data that is defined by the customer. It is capable of identifying more than 350 distinct data types, and once identified, customer-defined rules will block, alert or allow the transaction.

Since joining Cato, Maor has been creating quarterly threat landscape reports using data drawn from the firms global network, and the latest edition of this report also challenges established cyber thinking in many ways.

For example, to spend a few days immersed in the security community, one might reasonably expect that most cyber attacks originate from within countries such as China or Russia, but Catos data reveal this is far from the case.

In fact, during the first three months of 2022, the most malicious activity was initiated from within the US, followed by China, Germany, the UK and Japan. Note this data is related to malware command and control (C2) communications, therefore the data reveals what countries host the most C2 servers.

Maor said that understanding where attacks really originate from should be a crucial part of a defenders visibility into threats and trends. Attackers know full well that many organisations will add countries such as China or Russia to their deny lists or at the very least closely inspect traffic from those jurisdictions therefore, he said, it makes perfect sense for them to base their C2 infrastructure in countries that organisations perceive as safer.

Catos report also pulled data on the most-abused cloud applications Microsoft, Google, RingCentral, AWS and Facebook in that order with Telegram, TikTok and YouTube also in vogue, likely as a result of the Russia-Ukraine war.

The report also showed the most targeted common vulnerabilities and exposures (CVEs) predictably, Log4Shell was the runaway winner here, with more than 24 million exploit attempts seen in Catos telemetry,but in second place was CVE-2009-2445, a 13-year-old vulnerability in Oracle iPlanet Web Server (formerly Sun Java System Web Server or Sun ONE Web Server) that lets an attacker read arbitrary JSP files via an alternate data stream syntax.

With such old vulnerabilities, people are completely unaware of them, said Maor. [It shows] the way defenders look at the network is completely different from how attackers do defenders will send me a PDF visual file of their servers, DMZ, cloud, et cetera, [but] attackers will say, Hey, you have a 14-year-old server, thats interesting.

Follow this link:
Cato aims to bust cyber myths as it extends network protections - ComputerWeekly.com

Read More..