Microsoft

Why Facebook blocked all news content in Australia — and why Google didn’t (GOOG, GOOGL, FB)

Summary List PlacementFacebook made huge waves on Wednesday by blocking all news content for its Australian users and all content from Australian news publishers for users worldwide.  Facebook said it made the move to avoid having to comply with Australia’s recently proposed News Media and Digital Platforms Mandatory Bargaining Code, which if passed would require…

Summary List PlacementFacebook made huge waves on Wednesday by blocking all news content for its Australian users and all content from Australian news publishers for users worldwide. 
Facebook said it made the move to avoid having to comply with Australia’s recently proposed News Media and Digital Platforms Mandatory Bargaining Code, which if passed would require companies like Facebook and Google to pay media publishers for the right to include their news content on social media platforms and search engines.
Google, however, decided that its best option would be to preemptively negotiate deals with publishers, including Rupert Murdoch’s News Corp and major Australian media conglomerates Nine Entertainment and Seven West Media.
Australian lawmakers have portrayed the proposed law as an effort to curb the tech giants’ power over digital advertising (a major cause of news publishers’ declining revenues over the past two decades). Facebook argued that the law misunderstands its relationship with publishers. 
But the situation is more complicated than an attempt to level the digital media playing field — and it could have consequences around the world.
Here’s what you need to know about the battle between Australia, Facebook, and Google over who pays for news online.
How did we get here?
News publishers have long had a bone to pick with companies like Facebook and Google, blaming them for eating away at ad revenues (and as a result, journalism jobs), while also exercising massive control over publishers through algorithms and benefitting from showing their users news content without paying its creators.
The companies have responded in recent years with various initiatives to fund journalism and boost news content on their platforms, such as Facebook’s Journalism Project and News tab, and Google’s News Initiative and News Showcase, but the impact has been modest and the industry continues to struggle.
Increasingly, regulators have sought to force Facebook and Google to pay publishers to use their content, and Australia has been at the forefront, along with the EU and countries including France, Germany, and Spain.
The Australian Competition and Consumer Commission, the country’s top antitrust regulator, has been working toward the law at the center of this week’s controversy for around three years amid Australia’s broader push to crack down on big tech.
What would Australia’s proposed law do?
The law as currently proposed would require companies like Facebook and Google to pay Australian publishers directly for news content that’s displayed or linked to on their sites, as well as give publishers 28 days’ notice before changing their algorithms.
Specifically, it would require them to individually negotiate content prices with publishers within three months, or be forced into an arbitration process where a government-appointed panel will pick between the publisher and tech giants’ proposals.
Is it likely to pass?
Yes. The lower chamber of Australia’s parliament approved the proposed legislation this week, and it’s now headed to the Senate, where it’s expected to pass into law, though discussions between the companies and the government are still ongoing.
Who would be the likely winners and losers?
As the Syndey Morning Herald reported, smaller publishers are not eligible for payments under the proposed law, so large publishers like News Corp may end up benefitting the most. (News Corp has urged the Australian government to pass the law).
Reporter Casey Newton also pointed out that the law also doesn’t require publishers to spend any new revenue on reporters or newsgathering efforts, meaning it could go to executives or investors.
Facebook’s and Google’s competitors could also gain an edge if their market share is diminished — Microsoft President Brad Smith endorsed the law last week.
As a result, the law could inadvertently further entrench Facebook’s and Google’s dominance, though it’s unclear what the ultimate impact would be on news publishers or the broader media ecosystem.
What was Facebook’s response? 
Facebook said in a blog post that the law “fundamentally misunderstands” its relationship with publishers — which it argued benefits publishers more. Facebook said news content is “less than 4% of the content people see” and that it brought in around $315 million for Australian publishers in 2020.
With less to lose, in its view, Facebook pulled the plug.
On Wednesday (Thursday in Australia), Facebook blocked Australian publishers from sharing or posting content from their pages, blocked Australian users from viewing any news content at all (even from international publishers), and blocked all users worldwide from viewing content from Australian publishers.
Some non-news pages also got caught up in Facebook’s dragnet by mistake.
What was Google’s response?
Alphabet subsidiary Google, which arguably has a more even exchange of value with news publishers, has fought aggressively against the proposed law. In January, the company came under fire for hiding some Australian news sites from its search results.
Google this week has been working on massive deals with top Australian media companies Seven West, Nine Entertainment, and even News Corp, which the company has repeatedly sparred with, and has been expanding its News Showcase in the region.Join the conversation about this story » NOW WATCH: Why Pikes Peak is the most dangerous racetrack in America
Read More

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Microsoft

The Outer Worlds 2 is now $10 cheaper, as Obsidian details how to get a refund on your pre-order

If you click on a link and make a purchase we may receive a small commission. Read our editorial policy. The Outer Worlds 2 is now $10 cheaper, as Obsidian details how to get a refund on your pre-order Cash in hand. Image credit: Obsidian News by Connor Makar Staff Writer Published on July 23

If you click on a link and make a purchase we may receive a small commission. Read our editorial policy.

The Outer Worlds 2 is now $10 cheaper, as Obsidian details how to get a refund on your pre-order

Cash in hand.

A character in a leafy ghilli suit leaps over a platform towards the camera while being shot at from afar.
Image credit: Obsidian

The Outer Worlds 2, the upcoming sci-fi FPS by Obsidian Entertainment will now be sold at $70 dollars, rather than the planned $80. This follows a statement by Microsoft confirming the U-turn earlier today.

Those who have already purchased the game at the $80 price point on Steam will have the purchase refunded and re-bought at the lower figure. On Battle.net, those who pre-ordered the game will have their orders cancelled and refunded, and will have to re-buy the game. Those on Xbox and PlayStation will have the difference refunded in the upcoming days.

This announcement was made on The Outer Worlds official social media accounts, with a cute in-universe statement and graphic. On the official Obsidian website, further explanation on how the price change will affect those who’ve already spent money has been provided.

Cover image for YouTube videoThe Outer Worlds 2 – Official Gameplay Trailer

Watch the gameplay trailer

Read More

Continue Reading
Microsoft

Microsoft reverses $80 first-party price hike to keep “full priced holiday releases in line with current conditions”

If you click on a link and make a purchase we may receive a small commission. Read our editorial policy. Home News Microsoft reverses $80 first-party price hike to keep “full priced holiday releases in line with current conditions” Starting with The Outer Worlds 2 Image credit: Obsidian Entertainment News by Vikki Blake Contributor Published

If you click on a link and make a purchase we may receive a small commission. Read our editorial policy.

Microsoft reverses $80 first-party price hike to keep “full priced holiday releases in line with current conditions”

Starting with The Outer Worlds 2

Image credit: Obsidian Entertainment

Just weeks after confirming The Outer Worlds 2 will be the first Microsoft game to retail for $80, Microsoft has reversed the decision, revealing the highly-anticipated sequel will now launch for $69.99 in keeping with typical AAA pricing.

This will apply not just to The Outer Worlds 2, but indeed other “full priced holiday releases” launched across the period.

In a statement, a Microsoft spokesperson said Xbox was “focused on bringing players incredible worlds to explore, and will keep our full priced holiday releases, including The Outer Worlds 2, at $69.99, in line with current market conditions.”

On social media, developer Obsidian posted: “We have received your SOS via skip drone about the pricing. As an organization devoted to making sure that corporations do not go unfettered, we at the Earth Directorate have worked with [REDACTED] to revise the price of The Outer Worlds 2. While this will not bring peace to the galaxy, or even your local colony, we assure you all that we are here to fight for all colonies in every way that we can.”

Microsoft announced last month that The Outer Worlds 2 would be the first Xbox title to retail at $80 following Microsoft’s planned price rises in May.

“We understand that these changes are challenging, and th

Read More

Continue Reading
Microsoft

Coyote malware abuses Windows accessibility framework for data theft

A new variant of the banking trojan ‘Coyote’ has begun abusing a Windows accessibility feature, Microsoft’s UI Automation framework, to identify which banking and cryptocurrency exchange sites are accessed on the device for potential credential theft. …

A new variant of the banking trojan ‘Coyote’ has begun abusing a Windows accessibility feature, Microsoft’s UI Automation framework, to identify which banking and cryptocurrency exchange sites are accessed on the device for potential credential theft. …
Read More

Continue Reading
Microsoft

Microsoft Server Software Comes Under Widespread Cyberattack

Breadcrumb Trail Links Home PMN Business Share this Story : Microsoft Rushes to Stop Hackers from Wreaking Global Havoc Copy Link Email X Reddit Pinterest LinkedIn Tumblr Microsoft Rushes to Stop Hackers from Wreaking Global Havoc Hackers exploited a security flaw in common Microsoft Corp. software to breach governments, businesses and other organizations across the

Microsoft Rushes to Stop Hackers from Wreaking Global Havoc

Hackers exploited a security flaw in common Microsoft Corp. software to breach governments, businesses and other organizations across the globe and steal sensitive information, according to officials and cybersecurity researchers.

Article content

(Bloomberg) — Hackers exploited a security flaw in common Microsoft Corp. software to breach governments, businesses and other organizations across the globe and steal sensitive information, according to officials and cybersecurity researchers.

Article content

Microsoft over the weekend released a patch for the vulnerability in servers of the SharePoint document management software. The company said it was still working to roll out other fixes after warnings that hackers were targeting SharePoint clients, using the flaw to enter file systems and execute code.

Article content
Article content

Story continues below

Article content

Multiple different hackers are launching attacks through the Microsoft vulnerability, according to representatives of two cybersecurity firms, CrowdStrike Holdings, Inc. and Google’s Mandiant Consulting.

Article content
Article content

Hackers have already used the flaw to break into the systems of national governments in Europe and the Middle East, according to a person familiar with the matter. In the US, they’ve accessed government systems, including ones belonging to the US Department of Education, Florida’s Department of Revenue and the Rhode Island General Assembly, said the person, who spoke on condition that they not be identified discussing the sensitive information.

Article content

Representatives of the Department of Education and Rhode Island legislature didn’t respond to calls and emails seeking comment Monday. A Florida Department of Revenue spokesperson, Bethany Wester Cutillo, said in an email that the SharePoint vulnerability is being investigated “at multiple levels of government” but that the state agency “does not comment publicly on the software we use for operations.”

Article content

Story continues below

Article content

The hackers also breached the systems of a US-based health-care provider and targeted a public university in Southeast Asia, according to a report from a cybersecurity firm reviewed by Bloomberg News. The report doesn’t identify either entity by name, but says the hackers have attempted to breach SharePoint servers in countries including Brazil, Canada, Indonesia, Spain, South Africa, Switzerland, the UK and the US. The firm asked not to be named because of the sensitivity of the information. 

Article content

In some systems they’ve broken into, the hackers have stolen sign-in credentials, including usernames, passwords, hash codes and tokens, according to a person familiar with the matter, who also spoke on condition that they not be identified discussing the sensitive information.

Article content

“This is a high-severity, high-urgency threat,” said Michael Sikorski, chief technology officer and head of threat intelligence for Unit 42 at Palo Alto Networks Inc. 

Article content

“What makes this especially concerning is SharePoint’s deep integration with Microsoft’s platform, including their services like Office, Teams, OneDrive and Outlook, which has all the information valuable to an attacker,” he said. “A compromise doesn’t stay contained—it opens the door to the entire network.” 

Article content

(Bloomberg) — Hackers exploited a security flaw in common Microsoft Corp. software to breach governments, businesses and other organizations across the globe and steal sensitive information, according to officials and cybersecurity researchers.

Article content

Microsoft over the weekend released a patch for the vulnerability in servers of the SharePoint document management software. The company said it was still working to roll out other fixes after warnings that hackers were targeting SharePoint clients, using the flaw to enter file systems and execute code.

Article content
Article content

Story continues below

Article content

Multiple different hackers are launching attacks through the Microsoft vulnerability, according to representatives of two cybersecurity firms, CrowdStrike Holdings, Inc. and Google’s Mandiant Consulting.

Article content
Article content

Hackers have already used the flaw to break into the systems of national governments in Europe and the Middle East, according to a person familiar with the matter. In the US, they’ve accessed government systems, including ones belonging to the US Department of Education, Florida’s Department of Revenue and the Rhode Island General Assembly, said the person, who spoke on condition that they not be identified discussing the sensitive information.

Article content

Representatives of the Department of Education and Rhode Island legislature didn’t respond to calls and emails seeking comment Monday. A Florida Department of Revenue spokesperson, Bethany Wester Cutillo, said in an email that the SharePoint vulnerability is being investigated “at multiple levels of government” but that the state agency “does not comment publicly on the software we use for operations.”

Article content

Story continues below

Article content

The hackers also breached the systems of a US-based health-care provider and targeted a public university in Southeast Asia, according to a report from a cybersecurity firm reviewed by Bloomberg News. The report doesn’t identify either entity by name, but says the hackers have attempted to breach SharePoint servers in countries including Brazil, Canada, Indonesia, Spain, South Africa, Switzerland, the UK and the US. The firm asked not to be named because of the sensitivity of the information. 

Article content

In some systems they’ve broken into, the hackers have stolen sign-in credentials, including usernames, passwords, hash codes and tokens, according to a person familiar with the matter, who also spoke on condition that they not be identified discussing the sensitive information.

Article content

“This is a high-severity, high-urgency threat,” said Michael Sikorski, chief technology officer and head of threat intelligence for Unit 42 at Palo Alto Networks Inc. 

Article content

“What makes this especially concerning is SharePoint’s deep integration with Microsoft’s platform, including their services like Office, Teams, OneDrive and Outlook, which has all the information valuable to an attacker,” he said. “A compromise doesn’t stay contained—it opens the door to the entire network.” 

Advertisement 2
Advertisement
Article content

Tens of thousands — if not hundreds of thousands — of businesses and institutions worldwide use SharePoint in some fashion to store and collaborate on documents. Microsoft said that attackers are specifically targeting clients running SharePoint servers from their own on-premise networks, as opposed to being hosted and managed by the tech firm. That could limit the impact to a subsection of customers.

Article content

A Microsoft spokesperson declined to comment beyond an earlier statement.

Article content

“It’s a dream for ransomware operators,” said Silas Cutler, a researcher at Michigan-based cybersecurity firm Censys. He estimated that more than 10,000 companies with SharePoint servers were at risk. The US had the largest number of such firms, followed by the Netherlands, the UK and Canada, he said. 

Article content

The breaches have drawn new scrutiny to Microsoft’s efforts to shore up its cybersecurity after a series of high-profile failures. The firm has hired executives from places like the US government and holds weekly meetings with senior executives to make its software more resilient. The company’s tech has been subject to several widespread and damaging hacks in recent years, and a 2024 US government report described the company’s security culture as in need of urgent reforms.

Article content

Story continues below

Article content

The Center for Internet Security, which operates a cybersecurity information sharing system for state and local governments in the US, found more than 1,100 servers that are at risk from the SharePoint vulnerability, said Randy Rose, the organization’s vice president of security operations and intelligence. Rose said more than 100 were likely hacked.

Article content

The Washington Post reported that the breach had affected US federal and state agencies, universities, energy companies and an Asian telecommunications company, citing state officials and private researchers.

Article content

Eye Security was the first to identify that attackers were actively exploiting the vulnerabilities in a wave of cyberattacks that began on Friday, said Vaisha Bernard, the company’s chief hacker and co-owner.

Article content

Eye Security said the vulnerability allows hackers to access SharePoint servers and steal keys that can let them impersonate users or services even after the server is patched. It said hackers can maintain access through backdoors or modified components that can survive updates and reboots of systems.

Article content

Story continues below

Article content

The SharePoint vulnerabilities, known as “ToolShell,” were first identified in May by researchers at a Berlin cybersecurity conference. In early July, Microsoft issued patches to fix the security holes, but hackers found another way in.

Article content

“There were ways around the patches,” which enabled hackers to break into SharePoint servers by tapping into similar vulnerabilities, said Bernard. “That allowed these attacks to happen.” The intrusions, he said, were not targeted and instead were aimed at compromising as many victims as possible. After scanning about 8,000 SharePoint servers, Bernard said he has so far identified at least 50 that were successfully compromised.

Article content

He declined to identify the identity of organizations that had been targeted, but said they included government agencies and private companies, including “bigger multinationals.” The victims were located in countries in North and South America, the EU, South Africa, and Australia, he added.

Article content
Article content

—With assistance from Lynn Doan, Cameron Fozi, Daniel Cancel, Aashna Shah, Jane Lanhee Lee and Patrick Howell O’Neill.

Article content

(Updates with additional information beginning in third paragraph.)

Article content

Comments
You must be logged in to join the discussion or read more comments.
Create an AccountSign in
Join the Conversation

Postmedia is committed to maintaining a lively but civil forum for discussion. Please keep comments relevant and respectful. Comments may take up to an hour to appear on the site. You will receive an email if there is a reply to your comment, an update to a thread you follow or if a user you follow comments. Visit our Community Guidelines for more information.

Read More

Continue Reading