• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Fake news is everywhere. Should the tech world help stop the spread?

November 26, 2016 by Roberto Nogueda Leave a Comment

During the election of 2016 Facebook found itself embroiled in the drama of fake news stories that were created by scammers looking to make a fast buck. Scammers knew they had a massive and willing audience of Facebook, and they struck. Pew Research, the nonpartisan American “fact tank” reported that week that 64% of adults get news through social media, yet only 4% of users trust the information they find on the platforms a lot and 30% trust it some.

To resolve this issue, Mark Zuckerberg said that Facebook is working on a fake new detection system, a warning system, and the means to report fake news, to for many, this plan is too little, too late this article says.

 

here is the rest of the article: http://www.techrepublic.com/article/fake-news-is-everywhere-should-the-tech-world-help-stop-the-spread/?ftag=TRE684d531&bhid=27250068933112925186573856412477

Filed Under: Week 10: Web Application Hacking Tagged With:

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in