Sorting fact from fiction online (11)

Sep 1, 2008 12:02 PM CST Sorting fact from fiction online
KHD100
KHD100KHD100Edmonton, Alberta Canada129 Threads 3 Polls 2,495 Posts
Myth or truth, hoax or helpful advice? Tips for sorting fact and fiction on the internet.

We can't resist a good story... or say "I knew it!" when it's proven wrong. With today's technology, it can be hard to tell the different between fact and fiction. The internet, social networking sites and email make it quicker and easier to "spread the word" about the latest heart-warming story, amazing photo, health alert or criminal tactic. Not everything we read is true, but the propagation of hoaxes can overshadow real stories and events.

For example, can you tell at a glance if these widely circulated stories and alerts are true?

1. Your email provider or social network has an over-crowded system and is trying to cull unused accounts. You need to forward or post a message to prove that your account is still active.

2. The latest car-jacking tactic is to put a flyer on your rear windshield -- forcing you to get out of your car to remove it. With your keys still in the ignition and your purse on the seat, thieves can assault you or steal your car.

3. According to a presenter at a medical conference, you can tell if someone has had a stroke by using the "Smile Test" (asking them to raise both arms, smile, and speak a simple sentence).

4. A woman shares her heart attack experience and warns others that the symptoms can be subtle and easy to miss -- especially in women.

5. Someone posing as a phone company technician calls and asks you to dial "90#" or "09#" as part of a system check. Dialling these numbers lets the scammer make long distance phone calls that will be charged back to you.

6. Aspartame has been proven to cause cancer, brain tumours, systemic lupus and multiple sclerosis.

7. Thieves can record the signals sent used by your car's remote keyless entry device and use them to break into your car.

8. Japanese farmers have developed a square-shaped watermelon that will take up less room on shelves.

9. Neiman-Marcus charged a woman $250 for a cookie recipe from their restaurant. When they refused to reverse the charge, she typed up the recipe and circulated it over the internet.

10. Irena Sendler saved 2500 Jewish children during the Holocaust by posing as a nurse to smuggle them out of the Warsaw Ghetto.

Think you know the "truth"? Keep reading.

Malicious intent or all-in-good-fun?

The "anyone-can-publish" and "copy-and-paste" nature of the internet makes it easy to propagate rumours, false information, scams and hoaxes. There's certainly good reason to be cautious about what we read, but fiction isn't always intended to be harmful.

As with any medium, the internet is a way for artists and writers to entertain others or make a social commentary. A hoax can be an attempt at fraud, a prank or a publicity stunt -- but other times it can be a statement about how we use media to spread false information. Sometimes the information is simply meant to be entertainment, but not everyone gets the joke.
Sep 1, 2008 12:02 PM CST Sorting fact from fiction online
KHD100
KHD100KHD100Edmonton, Alberta Canada129 Threads 3 Polls 2,495 Posts
Here are the answers to our quiz:*

1. False. While some providers will deactivate accounts that haven't been used for a given period of time, this isn't how they would handle customers. It's actually a modern-day chain letter.

2. False. Snopes reports that while the tactic is plausible, they haven't seen any reports or news to confirm it's been used, let alone turned into a crime epidemic. The warning is more than four years old.

3. Partly true. The conference and the presentation mentioning the "Smile Test" are real, but the American Heart Association has not yet taken a position on this topic and does not endorse the test.

4. Partly true. The story may not be a real case study, but a lot of the information about heart attack symptoms is true -- and worth looking into.

5. Partly true. According to Snopes, the "#-9-0" scam is technically possible for some phone systems still in use by business, government, universities and hospitals. However, it doesn't apply to residential phones or cell phones because you don't need to dial "9" to get an outside line.

6. False. The FDA confirms that aspartame is safe. This is another example of the internet and email being used to cause a false health scare.

7. False. It would take a lot of sophisticated equipment and a lot of time to steal a car this way. Most break-ins are crime of opportunity -- and the "smash and grab" is more effective.

8. True. According to Snopes, the still-growing fruit was inserted into square containers to give it the square shape. The BBC originally reported the story back in 2001.

9. False. Neiman-Marcus actually developed their cookie in response to this widespread story -- and they give away the real recipe on their website.

10. True. Sendler may not be as famous as Oskar Schindler, but the internet is helping to spread her story. See the New York Times and for more information.

*Source: Snopes.com
Sep 1, 2008 12:03 PM CST Sorting fact from fiction online
KHD100
KHD100KHD100Edmonton, Alberta Canada129 Threads 3 Polls 2,495 Posts
Okay, the "partly true" ones were a bit of trick. You've heard the saying that the most convincing lies are the ones that have a kernel of truth? The same principle applies -- there are a lot of "grey" areas. Sometimes a real photo ends up with a fictional description, or verifiable facts are used to lend credibility to falsehoods. Seemingly incredible stories are true, and many photos that look doctored aren't.

The truth is you just can't tell... or can you?

Before you hit "forward"

Consider the content. Does it really matter if a heart-warming story or humourous anecdote is true? Perhaps not, but a false health alert, caution about a product or service or police alert can needlessly scare people and cause panic. Remember: Scammers are relying on your instinct to help others.

Virus warnings are also problematic... they often contain the virus itself.

Check the facts. Your history teacher was right -- there is something to be said for looking at primary sources because criminals and pranksters hide behind seeming legitimate sources. Is the health alert really from the FDA? Was a product actually recalled due to a hazard? Did your local police issue an alert about a new crime or scam? You can tell by looking at official websites or directly contacting the organizations in question.

Sneaky scammers often include a line stating "I checked this on Snopes" or "I called the police/health organization/local authorities and this is real!" Don't believe it until you see the proof yourself.

Get the scoop. Don't have time to research yourself? Consult websites like Snopes, Urban Legends Online and Scambusters that focus on debunking popular stories and scams. They're also an entertaining read.

Search the news. The media has been known to fall for hoaxes as well, but chances are a widespread crime epidemic, product recall, believe-it-or-not story or health alert will hit the headlines.

Question the timing. Is the advice or warning current? For example, many requests for prayers are actually legitimate -- but it could be that the crisis is over by the time the information gets to you.

Make your messages count. Send out too many warnings and you'll get a reputation for spamming your friends and family. Avoid "crying wolf" with false information if you expect to be taken seriously later on.

Should you just hit "delete" or ignore questionable material? You might miss out on a good laugh or some good advice. True or not, emails and other communications can be a prompt to investigate a topic further. Just take everything with the proverbial "grain of salt" until you can verify the content.

For more information on what's lurking in your inbox, take a look at Email: What's safe, and what isn't
Sep 1, 2008 12:04 PM CST Sorting fact from fiction online
KHD100
KHD100KHD100Edmonton, Alberta Canada129 Threads 3 Polls 2,495 Posts
Email: What's safe, and what isn't

What's in your inbox? Find out how to protect your privacy and avoid costly risks like phishing schemes and viruses.

So what are the threats, and how can you avoid them? We've got your answers:

Viruses and malicious software

Viruses, worms, "Trojan horses" and other malware can cause damage to your system which is time-consuming and costly to fix. Not only can you lose your data, someone could hack into your computer for their own purposes -- such as using your address book to distribute the virus to your contacts. There are three main ways to "catch" a virus from email:

Opening an email: Viruses or malware can be embedded in the HTML or RTF (rich-text format) code of the message and set to activate when you read the message. Microsoft Outlook and Outlook Express used to be particularly vulnerable to attack given their tight integration with other software -- even viewing the message in the "reading pane" could trigger the attack. However, most email programs now protect against this threat by disabling script or blocking certain types of code in the message.

Opening an attachment: Attaching files to an email is a quick and easy way to share information -- and one of the most common ways to transmit viruses. Opening the email alone won't do it, but your computer will become infected when you open an attachment which is a virus or contains a virus.

Clicking on links can take you to an infected website or automatically download a virus or malware to your computer.

How can you protect yourself? Automatic processes and common sense are your best protection:

- Adjust your security settings. If you don't use one already, activate the spam filter in your email program. Turn off any options that allow attachments to download automatically or scripts or "ActiveX controls" to run. Experts still advise that "plain text" emails are the safest to view, but you can also limit the HTML code by adjusting your email settings.

- Ignore and delete emails from senders you don't know, especially if they contain attachments.

- Beware of the unexpected. Viruses can take control of email address books and send out messages to family, friends and colleagues. In other words, just because you know the sender doesn't mean the message is safe. If you weren't expecting an attachment, double check with the person who sent it before you open it.

- Scan it. Set your anti-virus software to scan emails and attachments. As an extra level of protection, save attachments and manually activate a virus scan before you open them.

Remember, "when in doubt, don't" -- don't open the email or its attachments, download or run any software or click on links.
Sep 1, 2008 12:05 PM CST Sorting fact from fiction online
KHD100
KHD100KHD100Edmonton, Alberta Canada129 Threads 3 Polls 2,495 Posts
Phishing scams

Phishing is the process of sending out an official-looking email in order to get victims to supply sensitive information like passwords, banking information, credit card numbers or social insurance number. The email may say there is a problem with your account and directs you to a website to verify financial information or enter your email and password. The con-artist could be posing as your bank, a local charity, a government institution, a business or a hiring employer, but their goal is to steal your cash or your identity.

The reasons these schemes are successful is that the emails and websites appear to be legitimate -- a technique known as "spoofing." Con-artists steal design elements (logos, colour schemes and layout) or source code from websites and legitimate emails to create their own fraudulent versions -- a wolf in sheep's clothing, so to speak.

It's hard to tell the real from the fake, but here's what you can do:

- Assume it's a fake. Any email asking for sensitive information should be treated with suspicion. While many companies do send out emails advertising new products or services, they usually call their customers directly if there is a problem with their account.

- Read closely. Watch for spelling and grammar mistakes throughout the email -- the "spoofed" part may be correct, but the added content may contain errors. Look for language and slang that may seem out of character for the person or organization supposedly sending the email. Is the tone formal in one part of the email, and more casual in another?

- Verify. If you think it might be a legitimate request (e.g. the message could be from a company you deal with) contact the institution yourself to see if there is a problem. Ignore all phone numbers and links in the email -- you don't know what's at the other end -- and instead look up the phone number or website via an internet search engine or phone book.

- Go to another source. If the message is from a company you don't know, don't try to contact them. Instead, stick to reputable sources for help. For example, if you receive an email confirming a purchase you never made, watch your credit card statement and contact your credit card company. Don't open any attached "invoices" or "receipts" -- they will likely contain a virus.

Charity scams, vacation scams, financial scams and other hoaxes are also perpetuated through email. More information about these issues can be found at 50Plus.com.
Sep 1, 2008 12:05 PM CST Sorting fact from fiction online
KHD100
KHD100KHD100Edmonton, Alberta Canada129 Threads 3 Polls 2,495 Posts
Privacy

Email should be considered part of your personal information -- just like your mailing address and telephone number -- and guarded with the same protection. You can cut down your exposure to spam and harmful risks by take a few precautions:

- Protect access. Change your email password from time to time, and never give it out.

- Create a separate email account for wide distribution. Sign up for a free service like Yahoo Mail, Hotmail or Gmail to use for social networking, newsletters and newsgroups, promotions and online dating.

- Beware of the bounce. Received a "could not deliver this message" notification for an email you didn't send? Check your "sent messages" folder for signs that someone has hacked into your email. Otherwise, the error message is either a trick to get you to read the email or your address was used in the "from" field of a spam message. (See Symantec's website for more information on this issue).

- Post with caution. If your address appears on a website, whether it's personal, professional or for a volunteer organization, make sure to disguise it from automatic scanning processes that capture your address and add it to spam lists. Switch out some of the characters such as (at) instead of @, and spell out "dotcom" instead of .com.

- Read the fine print. Before you sign up for a newsletter or alert, read the privacy policy first to make sure your information won't be shared. Legitimate businesses should always have a feature to allow you to "unsubscribe" and should never send you emails which you didn't request.

- Mind your CCs and BCCs. If you're sending out a single message to multiple recipients who don't know each other, protect their information by posting your own address in the "to field and list everyone else in the "BCC" (blind carbon copy) field rather than the "CC" field.

- Clear your cache. Adjust your internet browser settings to clear all personal information when you shut down the program, especially if you're using a public computer.

When it comes to harmful emails, even the most careful people get caught sometimes. It's important to know how to react, and to take action quickly if you become a victim. For example, if you suspect your email account has been compromised, change your password and contact your provider's help support for more information. A virus may require attention from a professional if your anti-virus software can't resolve the issue.

There are several organizations to which you can report phishing scams and fraud, including the Federal Trade Commission, the Anti-Phishing Working Group, SCAMwatch and Phonebusters. If you've given out your personal or financial information, treat it as a potential case of identity theft and contact your financial institutions and your local police fraud unit.

Resources: Anti-Phishing Working Group, Phonebusters, US-CERT Virus Basics
Sep 1, 2008 12:07 PM CST Sorting fact from fiction online
KHD100
KHD100KHD100Edmonton, Alberta Canada129 Threads 3 Polls 2,495 Posts
On guard: a layman's guide to cyber safety

You can keep your computer more secure by taking these simple steps.

We've all heard of the dangers. Cyber stalkers, phishers, scammers and hackers have dedicated themselves to all sorts of mischief from stealing passwords and money to crashing our hard drives.

Malicious spyware and adware can track your surfing and Internet activities, allowing companies to compile a huge amount of personal data. This compromise of personal privacy is not only disturbing, but dangerous as it can make you vulnerable for identity theft.

And while you can never completely eliminate computer-related security risks, here are some simple tips from Money Magazine to protect yourself (and to minimize the damage if you do get hit).

Stay up to date. Cyber thieves are constantly looking for flaws in your operating system, particularly if you run Windows. So it is important to update your critical software regularly. To do this automatically, check your settings (under Control Panel in Windows and System Preferences on Macs) to make sure automatic updates are on.

Use security software. If you operate on Windows, it is essential to have antivirus, anti-spyware and firewall software. The antivirus/anti-spyware programs from Symantec and McAfee cost US $40 for a year.

If your Internet service provider supplies free software, compare it with paid programs by downloading a free trial. A firewall blocks other computers on the Internet from gaining access to your computer. The latest versions of Windows and Mac OS X have optional basic firewalls. Windows users should also consider using a third-party firewall. ZoneAlarm is a free download available at zonelabs.com. Firewalls also come bundled with all-in-one Internet-security programs, which range in price from US$50 to $70.

Don't assume you’re safe. Even with security software, you still face new risks that your program doesn’t know about yet. Similar to life off-line, street smarts are essential. When visiting unfamiliar websites, assume that any free down-load could contain a dangerous program. This is also true for emails and attachments sent by strangers.
Sep 1, 2008 12:08 PM CST Sorting fact from fiction online
KHD100
KHD100KHD100Edmonton, Alberta Canada129 Threads 3 Polls 2,495 Posts
In fact, a U.S. study found that one in 25 sites contained intrusive software, ranging from adware to keystroking programs that allow someone to see what you type. Many of the most dangerous sites offer enticements such as free games, illegal music downloads or screen savers.

Get a router – and lock it down. Almost any $30 Wi-Fi router beefs up your security by acting as yet another firewall. But this doesn’t help much if you then leave your wireless connection open to anyone driving down your street.

If you have unencrypted Wi-Fi, anybody can log on to your network and use your bandwidth - or more ominously, watch what you do or even break into your computer. Be sure to set your router to encrypt your data. You usually have two choices: WEP or WPA. Experts advise WPA because it’s harder to break.

Use caution at the coffee shop. More and more cafes and coffee shops offer free laptop Wi-Fi access. But this easy access also makes it easy for a fellow patron to spy on you. Make sure your computer is set not to share files with a network, and avoid typing in passwords or sensitive data, especially if you're on an unsecured Web page (one that doesn't start with "https").

And under no circumstances should you do your banking in a public spot.

Get really, really smart about passwords. Use different passwords for your sensitive accounts. A strong password is long, combines letters and numbers and should not be anything that someone who knows a bit about you could guess. Microsoft has a tool that tests password strength (http://www.microcrosoft.com/protect). Unfortunately, such a password is often difficult to remember.

Remember: your computer knows everything. As you surf the Net, your browser can make a record of every site you visit. "Cookies" are typically loaded onto your computer by the sites you visit, as well as storing copies of those sites in your cache file. This makes your history easily accessible to anyone else who looks at your browser. The new Internet Explorer and Firefox have functions under Tools that clear your browsing history.

Wipe it clean – or smash it to bits. Personal information can remain on your hard drive even after you think you deleted them. Before you throw or give away an old computer, wipe your hard drive clean with high quality disk wipers, or you can download for free Darik’s Boot and Nuke at dban.sourceforge.net. Some experts recommend taking this a bit further by literally destroying your old hard drive.

Don't assume you are anonymous online. Many websites keep detailed records about their visitors, and your digital footprints could, in theory, be traced to you.



This information came from 50plus.com
Sep 1, 2008 12:13 PM CST Sorting fact from fiction online
KHD100
KHD100KHD100Edmonton, Alberta Canada129 Threads 3 Polls 2,495 Posts
This is where I admit, I do not open emails that are marked. "FW."

If I get an email that has FW, it is automatically deleted.
Sep 1, 2008 6:00 PM CST Sorting fact from fiction online
tunzrok
tunzroktunzroklondon, Ontario Canada900 Posts
KHD100: In fact, a U.S. study found that one in 25 sites contained intrusive software, ranging from adware to keystroking programs that allow someone to see what you type. Many of the most dangerous sites offer enticements such as free games, illegal music downloads or screen savers.

Get a router – and lock it down. Almost any $30 Wi-Fi router beefs up your security by acting as yet another firewall. But this doesn’t help much if you then leave your wireless connection open to anyone driving down your street.

If you have unencrypted Wi-Fi, anybody can log on to your network and use your bandwidth - or more ominously, watch what you do or even break into your computer. Be sure to set your router to encrypt your data. You usually have two choices: WEP or WPA. Experts advise WPA because it’s harder to break.

Use caution at the coffee shop. More and more cafes and coffee shops offer free laptop Wi-Fi access. But this easy access also makes it easy for a fellow patron to spy on you. Make sure your computer is set not to share files with a network, and avoid typing in passwords or sensitive data, especially if you're on an unsecured Web page (one that doesn't start with "https").

And under no circumstances should you do your banking in a public spot.

Get really, really smart about passwords. Use different passwords for your sensitive accounts. A strong password is long, combines letters and numbers and should not be anything that someone who knows a bit about you could guess. Microsoft has a tool that tests password strength (http://www.microcrosoft.com/protect). Unfortunately, such a password is often difficult to remember.

Remember: your computer knows everything. As you surf the Net, your browser can make a record of every site you visit. "Cookies" are typically loaded onto your computer by the sites you visit, as well as storing copies of those sites in your cache file. This makes your history easily accessible to anyone else who looks at your browser. The new Internet Explorer and Firefox have functions under Tools that clear your browsing history.

Wipe it clean – or smash it to bits. Personal information can remain on your hard drive even after you think you deleted them. Before you throw or give away an old computer, wipe your hard drive clean with high quality disk wipers, or you can download for free Darik’s Boot and Nuke at dban.sourceforge.net. Some experts recommend taking this a bit further by literally destroying your old hard drive.

Don't assume you are anonymous online. Many websites keep detailed records about their visitors, and your digital footprints could, in theory, be traced to you.



This information came from 50plus.com


thumbs up Good info KHD100
Sep 2, 2008 7:33 PM CST Sorting fact from fiction online
gemery
gemerygemeryWilliams Lake, British Columbia Canada5 Threads 509 Posts
Wow! Aren't you miss resourceful! laugh

The square watermelon one I knew to be probably true. From working in the forest industry, I knew the Japanese can also take a round log and make it square to reduce waste. They put it in a 4-sided press and then microwave it. Makes the log square. Who would have thunk eh? rolling on the floor laughing

Snopes is a wealth of information and I have used them countless times...ummmm...well after I got caught with falling for a hoax that is. And felt foolish for falling for it. Well, it was sort of something the government would have done.

Aspertame? Yes, the FDR says it is safe...but can they be believed? Thalidimide was safe too. I have a tendency to not believe anything the government or a government department tells me. So if they say it is safe, then somebody is probably paying them a lot of money to say so. grin

Good stuff though Khd..

geo
Post Comment - Post a comment on this Forum Thread

Stats for this Thread

1,055 Views
10 Comments
by KHD100 (129 Threads)
Created: Sep 2008
Last Viewed: just now
Last Commented: Sep 2008

Share this Thread

We use cookies to ensure that you have the best experience possible on our website. Read Our Privacy Policy Here