2 Tech Industry Digital Media Politics Internet Services Tags Comments Facebook Facebook has released a progress report on its civil rights audit, which shows it’s made some significant changes like strengthening efforts to fight voter suppression and cracking down on fake accounts seeking to influence political views.The social network unveiled on Tuesday the results of the first six months of the audit (PDF), which it launched in May in response to demands from civil rights organizations. Laura Murphy, a civil liberties leader and longtime ACLU director, led the audit. After meeting with civil rights leaders and experts, Murphy said in the progress report, Facebook decided to focus the first phase of its audit on preventing voter intimidation and suppression ahead of the US 2018 midterm elections.The social network acknowledged that implementation took longer than expected but said it was able to make important changes on its platform including strengthening efforts against voter suppression; supporting voter engagement; bringing in voting experts to inform training and policy; adding ways for users to report incorrect voting information; creating channels for state election authorities to report potential voter suppression content; and tackling fake accounts. Facebook also highlighted its “war room” efforts to combat fake election news leading up to the midterms. “Facebook is committed to working with leading US civil rights organizations to strengthen and advance civil rights on our service. They’ve raised a number of important concerns, and I’m grateful for their candor and guidance,” Sheryl Sandberg, chief operating officer of Facebook, said in a blog post. “We know that we need to do more: to listen, look deeper and take action to respect fundamental rights.” The social media giant plans to continue the audit in 2019, focusing on content moderation and creating a “civil rights accountability infrastructure” to make sure Facebook stays on the right track. Facebook will release another progress report on the audit next year, Murphy said. Share your voice Facebook
reading • 2020 Land Rover Discovery Sport updated with mild hybrid powertrain, more in-car tech 2019 Land Rover Range Rover P400e review: A hard hybrid to recommend Aug 31 • Your phone screen is gross. Here’s how to clean it More about 2015 Land Rover Discovery Sport AWD 4dr SE Preview • 2018 Range Rover Velar: Effortless SUV elegance on- and off-road Aug 31 • iPhone XR vs. iPhone 8 Plus: Which iPhone should you buy? Land Rover Apple SUVs Tags See All Post a comment 2020 Land Rover Range Rover Evoque review: Style, now with more substance Apple Aug 31 • iPhone 11, Apple Watch 5 and more: The final rumors More From Roadshow Aug 31 • Best places to sell your used electronics in 2019 Disco never died, it just hid out until Land Rover sought to bring it, and the Disco Sport, back to life. Now, a couple of years later, the latter is staring down some quality upgrades for the 2020 model year.Land Rover on Tuesday unveiled the 2020 Discovery Sport. On the spectrum of refreshes, this one is right about in the middle, making some slight visual changes while also updating the more important underlying bits. Two new powertrains have been introduced: One is a 246-horsepower I4 from the modular Ingenium engine family, while the other one slaps a 48-volt mild hybrid system into the equation, boosting its output to 286 horsepower.That new mild hybrid system comes alongside a new underlying platform. Now riding on Land Rover’s Premium Transverse Architecture platform, not only does it allow the Discovery Sport to pick up this kind of electrification, it makes the body some 13 percent stiffer. It’s also quieter, thanks to some improved sound deadening measures.As for style, it’s a little different, but not too much. The front and rear bumpers are new, and to my eyes, a little sportier-lookin’ than before. The grille is different, but I didn’t notice that until I read it in the press release. There are also some new LED lights to further differentiate the refreshed Disco Sport from its forebear.Enlarge ImageIt might take a keen eye to find the differences, but on the whole, they make for a more premium-looking SUV. Land Rover Inside, the center console has been redesigned, eschewing the rotary dial in favor of the sticklike gear lever seen on other Jaguar Land Rover vehicles. This rejiggering also makes enough space for wireless device charging, a first for the Disco Sport. Six USB ports are scattered throughout, as well. A new rearview mirror can display what the rearview camera sees, while additional cameras beneath the front end allow off-roaders to see “through” the hood on the infotainment display.The interior is further gussied up with more premium materials, including a new optional non-leather seat material made from recycled polyester microfiber. You can even spec massaging seats, if you feel like really going for broke. Behind the first row, there are new cup holders and redesigned storage spaces, in addition to extra seat configurability, bringing the total number of available seat configurations to 24.On the infotainment front, the Discovery Sport now rocks Land Rover’s InControl Touch Pro system, with its 10-inch touchscreen replacing the outgoing setup. It’s not Touch Pro Duo, though — the climate controls aren’t relegated to their own screen. Apple CarPlay and Android Auto are available, as is a 4G Wi-Fi hotspot. Safety systems are available, but not standard, and they include adaptive cruise control, automatic emergency braking and lane-keep assist.The 2020 Land Rover Discovery Sport hits dealerships in the summer, and pricing will be announced closer to the car’s on-sale date.Originally posted May 21.Update, June 10: Reduced mild hybrid output by 10 horsepower due to an error in Land Rover’s press release. Share your voice 0 Land Rover •
Taliban militants launched an attack on a foreign compound in Kabul on Saturday, officials said, the latest in a series of strikes in the Afghan capital during the final weeks of NATO’s 13-year war against the insurgents.Gunfire and explosions erupted as elite commando police fought with the attackers in west Kabul, not far from the parliament.The attack came two days after the Taliban attacked a foreign guesthouse in the diplomatic district of the city and a suicide bomber targeted a British embassy vehicle in a blast that killed six people.Kabul has been hit by at least nine attacks in the last two weeks, with targets including US military convoys, foreign security contractor compounds and a female Afghan member of parliament.On December 31, the US-led NATO combat mission in Afghanistan will end and be replaced by a follow-on mission tasked with supporting the Afghan army and police who have taken over responsibility for thwarting the Taliban.
For small, medium and large companies, the threat to both customers’ data and the company’s bottom line is real. This past August, the Department of Homeland Security announced that “Backoff,” an aggressive piece of point of sale malware, was responsible for breaches at several stores, and that it could afflict the networks of up to 1,000 other retailers.There’s ample advice out there telling chief information officers, or CIO, to build a breach recovery plan, but the key steps to avoiding such an event are not as clear. The first move is to ensure compliance with PCI guidelines for basic data security. Beyond that, here are four steps to protect retail customers from a breach:Related: 6 Leaders Share the Secrets to SaaS Startup Success1. Know when to call for backup.In today’s complex business environment, underpinned by cloud, mobile and other new technologies, it’s a real challenge to keep up with security news and monitor all potential weaknesses at all times. That can be a massive undertaking and one that shouldn’t always be left to the CIO.After analyzing specific needs and security team abilities, the next step is deciding whether it makes sense to recruit outside help from auditors or other security experts, or if it’s time to hire a full-time chief information security officer (CISO), a person tasked with knowing about vulnerabilities and preventing them from harming business.When Target’s data was compromised, Karl Mattson, the retailer’s former global and cyber intelligence manager, argued that a CISO was the missing link. By June of last year, Target had staffed the role, tasking Brad Maiorino, who previously held CISO positions at General Motors and General Electric, with homing in on both internal and external risks and making sure key company stakeholders were always in the loop.This staffing format allows a CIO to focus on overseeing business processes while relying on the CISO to dive deeper to ensure no security vulnerabilities are left undetected. For small businesses, bringing in a temporary consultant or part-time IT security professional should be sufficient to help minimize risk. 2. Avoid processing payments in-house.It’s easy to understand the appeal of processing payments in-house, since businesses who do this may save a few cents per transaction. But it’s risky. Breaches have increased in frequency as more companies have transitioned to processing their own payments.A breach at TJX in 2007 that cost the company $265 million and the recent Target breach of 2013 that totaled $148 million prove the high-risk nature of processing payments in-house. This creates a one-stop shop for hackers to access the information they’re after.As cyber criminals get better at targeting in-house systems, the need to externalize payment processing also becomes greater. For the majority of retailers, cloud-based processing systems will add an ideal layer of security that eliminates the physical link between a customer’s card, a payment terminal and the in-store systems. The bottom line: Spend a bit more now to reduce the liability later.3. Brush up on encryption and tokenization.The most secure data is the kind cyber criminals can’t read. Encryption, tokenization- –or better yet, a combination of the two — can ensure that customer information is extremely difficult to decipher. So how do the two differ, exactly? End-to-end encryption ensures sensitive information requires a “key,” or a constantly changing numerical code to access. Data that’s in transit between point of sale systems and processing locations is effectively scrambled, making it illegible until it reaches an end point. However, effective management of encryption key access is a crucial step in keeping customer information secure.Related: 4 Essential BYOD Security MeasuresTokenization, on the other hand, isn’t a new practice, but it is a rising star in the payments industry thanks, in part, to the introduction of Apple Pay. Unlike encryption, it sends data from one point to another without the information ever being identified, scrambling it without the use of a key. If attackers are able to gain access to data, they still can’t view credit card numbers or passwords, but rather a fake version of the data. In many cases, the actual data is stored locally or by a third-party service, which are the only places it can be read correctly.4. Understand and embrace emerging payment technologyThe retail industry is going through significant changes right now — from mobile payments to the adoption of EMV card processing. For the risk-averse, adding more payment options to the mix might seem like a dangerous route, but as these new tender types gain popularity, companies should support them to remain competitive. And as the threat of breaches grows, these new methods provide innovative ways to safeguard customer and business data.With the October 2015 deadline for EMV compliance fast approaching, now is the time to implement chip-and-pin card readers. Sure, adopting the proper POS hardware and software just in the knick of time next year will avoid financial responsibility if a breach happens after the deadline but adopting EMV now means fewer gaps in stores’ security plans pre- October 2015. With EMV’s three-pronged security system, each sale is linked to a transaction number, instead of specific credit card details, making it far more secure than traditional magnetic-stripe card payments.Mobile is also making waves for its security capabilities. Some systems one-up not just traditional mag-stripe credit and debit payments, but even EMV. Those that access credit card information to complete purchases incorporate safety measures already in place through card providers, but they also bring the added benefit of transparency via real-time account alerts. Some also have features that help identify purchases and detect fraud early on. Plus, shoppers are likely to notice a missing phone faster than a missing wallet.While all of the steps outlined above can play a key role in amping up security on their own, the best retail strategy blends them together. In other words, retailers can’t just pick and choose; they need to implement all of these methods to keep customer data safe.Other tips to keep hackers at bay? Schedule training sessions and perform regular employee background checks to ensure all hardware and software is current.And if disaster does strike, the best line of defense is a go-to approach for communicating the breach to customers quickly and effectively. After all, reputations and jobs depend on the trust of shoppers. Related: 12 Tips to Protect Your Company Website From Hackers March 19, 2015 Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global 6 min read Growing a business sometimes requires thinking outside the box. Register Now » Opinions expressed by Entrepreneur contributors are their own.