According to the Washington Post (Warning: source may be paywalled; alternate source), the “fake news” phenomenon that circulated thousands of phony stories during the election was aided by a sophisticated Russian propaganda effort that aimed to punish Democrat Hillary Clinton,…

Microsoft Is Working On a New Design Language For Windows 10 Codenamed Project NEON
An anonymous reader quotes a report from Windows Central: Microsoft has made several adjustments to its design language over the last few years, starting with Windows 8 and evolving into what we now know as “Microsoft Design Language 2” or…

Trump National Security Adviser Michael Flynn Had 'Forbidden' Internet Connection At the Pentagon, Says Report
According to The New Yorker, President-elect Donald Trump’s national security advisor, retired Lt. Gen. Michael Flynn, installed a secret internet connection into his office at the Pentagon even though it was “forbidden.” Business Insider reports: The network connection was among…

Google secures five-year access to health data of 1.6m people
Privacy campaigners raise fears about transparency and explicit consent as health service shares patient data

Facebook ‘quietly developing censorship tool’ for China
Tool would be offered to third parties to monitor stories that ‘bubble up’ as users share them

‘Compromised’ laptop implicated in US Navy breach of 130,000 records
Names and social security numbers of more than 130,000 serving and former sailors “accessed by unknown individuals”

Don’t be a security turkey this Thanksgiving!
Here’s a plain-talking video to help you stay secure this weekend…and on into the New Year.

The malicious iPhone video with a silver lining
It might just be a video that crashes your iPhone so hard you have to do a force restart, but that’s enough of a risk to be worth noting

Fraudsters eat for free as Deliveroo accounts hit by mystery breach
Company blames credentials stolen from another company for string of rogue transactions

Russian Hacker Conspiracy Theory is Weak, But the Case For Paper Ballots is Strong
On Wednesday, J. Alex Halderman, the director of the University of Michigan’s Center for Computer Security & Society and a respected voice in computer science and information society, said that the Clinton Campaign should ask for a recount of the…