Latest news with #Elmo
Yahoo
a day ago
- Politics
- Yahoo
Portland anti-ICE demonstrators confused when person in full-size Elmo costume shows up
An adult dressed in an Elmo costume was caught on camera trolling protesters outside a U.S. Immigration and Customs Enforcement (ICE) facility in Portland, Oregon, over the weekend, clashing with demonstrators. Katie Daviscourt of The Post Millennial filmed the confrontation at the ICE South Waterfront facility on Saturday. In the video, the unidentified person in the costume is seen posing on the ground in front of the entrance to the ICE facility, crawling around outside and then dancing in front of the anti-ICE demonstrators who attempted to confront the person. The incident reportedly left anti-ICE demonstrators confused and frustrated, according to newsgathering website Storyful. Multiple Arrests After Violent Mob Attacks Portland Ice Facility With Fireworks And Knives Earlier this month, Portland's progressive-leaning city council was exploring ways to expel ICE from the detention facility that has become a flashpoint for violent clashes between agents and radical agitators. Read On The Fox News App City councilors told a packed hearing that they would consider revoking ICE's permit to operate the South Waterfront facility due to alleged violations of a 2011 conditional-use permit, according to local news outlet Willamette Week. Portland Anti-ice Riot Crushed By Federal Agents The permit allows detention and administrative use under specific limitations, but lawmakers have raised concerns that ICE has been holding detainees there for longer than the required 12-hour limit. Residents and lawmakers raised other concerns, saying that the facility undermines the city's sanctuary city policy, while residents testified about targeted arrests, gas attacks and intimidation. "Our values of sanctuary and humanity are under siege," local resident Michelle Dar said. She also said that federal agents' armed actions threatened everyone's safety, not just that of immigrants. Other residents complained that loud bangs and flashbangs were disrupting life for residents of subsidized housing and students of a local school. A handful of people also blamed Antifa for the ugly scenes outside the facility. Chaotic scenes have been unfolding outside the facility since June, including in one incident when a large group of anti-ICE protesters tried to block law enforcement vehicles from entering and exiting the facility, forcing agents to deploy rubber bullets, tear gas and flash bangs to disperse the crowd. Fox News' Michael Dorgan, Alexandra Koch and Bill Melugin contributed to this report. Original article source: Portland anti-ICE demonstrators confused when person in full-size Elmo costume shows up Solve the daily Crossword


Fox News
a day ago
- Entertainment
- Fox News
Person dressed in Elmo costume disrupts anti-ICE protest
A person dressed in an Elmo costume caused a scene while disrupting an anti-ICE protest in Portland, Oregon, on July 26, 2025. (Credit: Katie Daviscourt/The Post Millennial)


Fast Company
22-07-2025
- Entertainment
- Fast Company
Elmo sparks a national therapy session: A brief oral history
On Monday morning, January 29, 2024, Christina Vittas posted a nine-word tweet: 'Elmo is just checking in! How is everybody doing?' Apparently, not so great. Vittas had been managing the social accounts for the beloved Sesame Street superstar since the end of 2020. She hadn't anticipated that Elmo's friendly question would tap into a deep vein of national angst: a looming presidential election, inflation, and conflicts in Gaza and Ukraine. Christina Vittas: I thought, Strategically, when is the best time for Elmo to post this? Monday morning, right? People are getting back in. 'How are we doing?' is a question that a friend would ask. I posted on X at 10:46 a.m. The super-early-rate deadline for Fast Company's Most Innovative Companies Awards is this Friday, July 25, at 11:59 p.m. PT. Apply today.


The Herald Scotland
21-07-2025
- Politics
- The Herald Scotland
Epstein backlash is souring Trump's winning streak
Answer: Jeffrey Epstein. After continuing to amass unprecedented power in the White House, steamrolling a compliant Congress and being nominated for the Nobel Peace Prize by world leaders more eager to flatter than confront him, Trump finds himself flummoxed by the case of a disgraced financier who died in a jail cell six years ago. Epstein's ghost is beginning to haunt the White House. The very tools that helped win Trump two terms - the openness to conspiracy, the distrust of elites, the eruption of a viral moment - have now turned to bedevil him. In this case, the assertion this month by the Justice Department and the FBI that the Epstein case was over and done with was met by derision and disbelief among some of the president's most loyal supporters. After all, such influential MAGA voices as Tucker Carlson and Steve Bannon had been insisting for years that Epstein's suicide was suspicious and his powerful associates hidden. A week ago, Trump told his supporters to "not waste Time and Energy on Jeffrey Epstein, somebody that nobody cares about." He followed up by denouncing his supporters who were upset with the case as "weaklings" who had "bought into this bulls***, hook, line and sinker." Those instructions didn't sway many in his political base. Then he directed Attorney General Pam Bondi to release the investigation's grand-jury testimony, a step that can only be ordered by a judge. Now Trump has filed a lawsuit for libel and slander against the Wall Street Journal, its publisher, two of its reporters, and News Corp founder and former friend Rupert Murdoch. At issue is its story that Trump sent a "bawdy" 50th-birthday letter to Epstein in 2003, decorated with a crude drawing of a woman's naked body that used his distinctive signature to suggest pubic hair. More: Trump: Epstein grand jury records unlikely to satisfy critics "Happy Birthday - and may every day be another wonderful secret," it reportedly said. Trump called the article "false" and demanded damages "not to be less than $10 billion." But he acknowledged on the social-media platform Truth Social that the release of grand-jury testimony isn't likely to settle things. [N]othing will be good enough for the troublemakers and radical left lunatics making the request," he railed. "It will always be more, more, more. MAGA!" A furor that swamps Medicaid cuts and Elmo's future A purported "Epstein client list" and the dark suspicion that powerful people are being protected has created a political firestorm stronger than the prospect of cutting an estimated 12 million people off Medicaid or the proposal to end federal funding for Elmo. The cuts in health care for the poor were part of the "Big Beautiful Bill" that Congress passed July 3 -, extending Trump's first-term tax cuts, increasing spending on border security and slashing funds for Medicaid, food stamps and green energy. On Friday, July 18, Congress approved $9 billion in spending cuts in foreign aid and public broadcasting, Muppets included. The so-called recission package deleted funding Congress had previously approved and reflected the Capitol's voluntary retreat from its constitutional power to decide how tax money should be spent. In the past, the tactic has rarely succeeded. In the future, the White House budget office said more such cuts would be on their way. But that consequential debate got less ink and fueled less furor than the Epstein saga. Trump's attempt to convince Americans that there is nothing to see here is likely to be an uphill battle. In a Reuters/Ipsos Poll, 69% of Americans said they thought the federal government was hiding details about Epstein's clients. Only 6% said information wasn't being hidden. The rest weren't sure. The poll, taken July 15-16, has a margin of error of plus or minus 3% for all adults and 6% for subgroups. Those who see a conspiracy afoot included a 55% majority of Republicans. Only about a third of those in the GOP, 35%, approved of how Trump is handling the issue. Overall, just 17% approved, his lowest rating on any issue. The long lifespans of conspiracy theories One lesson of Trump's political career is this: Once you've persuaded people there's fire behind the smoke, it's hard to convince them that the air has been cleared. When Barack Obama ran for the White House in 2008, Trump repeated debunked allegations that the Illinois senator had been born in Kenya and wasn't eligible to be elected president. After Obama had served two terms in the White House, a Morning Consult poll found a third of Republicans still believed that falsehood. Since the 2020 election that Trump lost, he has repeated disproven allegations that the election was rigged against him. When the 2024 campaign was getting underway, a CNN poll found that 69% of Republicans and those who "leaned" to the GOP believed Joe Biden's win wasn't legitimate, that the election had been stolen. And Epstein? Welcome or not, he may be sticking around for a while.


Fox News
20-07-2025
- General
- Fox News
Elmo hack exposes serious social media cybersecurity threats
As you scroll through X (formerly Twitter), you might come across Elmo, the lovable red monster cherished by children and parents, sharing cheerful, family-friendly content. However, recently, the official Elmo account had suddenly posted hate speech, racist slurs and political attacks. This shocking breach transformed a beloved feed into a source of confusion and pain. Sesame Workshop, the team behind Elmo, acted swiftly to remove the offensive posts, but for millions of fans, the damage had already been done. This was far more than a typical hack. It represented the digital defacement of one of the world's most trusted childhood icons. This incident underscores that in today's cyber landscape, no account, not even the most seemingly secure one, is immune to attackers. Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide — free when you join my Hackers crave reach and attention, and few targets offer more than a beloved global brand. When attackers seize control of an account with hundreds of thousands of followers, they gain immediate access to amplify their message, whether it be misinformation, hate speech or targeted harassment. The Elmo incident wasn't about stealing data or ransoming accounts; this was about causing chaos, sowing division and breaking trust. For years, Elmo's online voice was synonymous with joy and support. With a single breach, that reputation was battered, as followers questioned how such ugliness could appear from a character so trusted. Brand reputation, built over decades, was compromised in minutes. As Sesame Workshop stated in response, "Elmo's X account was briefly hacked by an outside party in spite of the security measures in place. We strongly condemn the abhorrent antisemitic and racist content, and the account has since been secured. These posts in no way reflect the values of Sesame Workshop or Sesame Street, and no one at the organization was involved." This incident underscores the importance of robust cybersecurity measures, especially when trusted brands serve as platforms for millions worldwide. To better understand what happened, we turned to Daniel Tobok, CEO of Cypfer, a leading global cybersecurity and incident response firm. Daniel has spent over 30 years guiding organizations through major cyber events. "Unfortunately, a lot of credentials are harvested and sold on the dark web between different threat actor groups despite strong passwords or MFA barriers. Maybe someone lost their password or an administrator had theirs saved on a laptop that was part of another breach. Once those passwords are collected, they get traded or sold," Daniel explained. While brute-force attacks still happen, most criminals don't waste time hammering away at complex passwords. Instead, they exploit simpler routes: snatching passwords from old breaches, targeting users directly or hijacking password vaults, especially those managed by social media admins. "Brute-force attacks make a lot of noise and can trigger alerts. It's not the most popular strategy anymore because it's so noisy," Tobok adds. Unfortunately, you might not get a warning that your account is being targeted. Tobok points out, "There really isn't public-facing software that notifies you. Sometimes, you might get an email saying, 'We noticed unusual activity. Was this you?' That typically comes through MFA channels. But most executives don't manage their own social media accounts. It's usually someone on their team or a designated admin. So, if something goes wrong, they're not necessarily the ones who will see it." Hackers can even set up rules that reroute security notifications away from your inbox, leaving you completely unaware that anything's wrong, until it's too late. Hackers are counting on you to get complacent. Daniel calls out pitfalls to avoid: Most alarmingly, Daniel added, "Most people's information has already been compromised at some point. There are over 4.8 billion passwords circulating on the dark web right now. And, finally, never reuse the same password across multiple platforms. I know it's tedious, but that's what proper hygiene looks like." Act fast. Here's Daniel's step-by-step plan: "If you still have access, change your password right away. Most threat actors, once they're in, will immediately change the password and the email linked to the account so they can take full control. If you're locked out, you need to contact the platform and provide proof that it's your account. Request that they shut it down or help you recover it. The good news is, most platforms will act quickly, especially if you tell them someone is posting offensive or racist content from your account." Protecting your social media accounts is more important than ever. Follow these steps to strengthen your cybersecurity and keep hackers out: Create passwords with at least nine characters, mixing uppercase, lowercase, numbers and symbols. Never reuse passwords across platforms, and update them regularly for maximum protection. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. Also, use a password manager instead of sending passwords through unencrypted messages. Password managers allow you to share credentials when absolutely necessary and help prevent leaks securely. Check out the best expert-reviewed password managers of 2025 at Always activate MFA to add an extra layer of login protection. This makes it much harder for unauthorized users to gain access, even if your password is compromised. Take advantage of account alerts and limit unsuccessful login attempts to detect intruders quickly. Regularly review these alerts so you can respond immediately if something looks off. Apply for official account verification when possible to add an extra safeguard and make recovery easier. Verification can also deter impersonation and build trust with your audience. Check and keep your recovery email and phone number current to regain access if needed. Outdated information could lock you out just when you need to recover your account the most. Remove apps or services you no longer use; these can become weak points if they are compromised. Regularly audit connected apps to ensure your data isn't exposed through unused integrations. Use platform features or trusted tools to back up important data in case of account loss or lockout. This simple step can be a lifesaver if you ever lose access or your data is accidentally deleted. Install strong antivirus software on all devices used to access social media. Regular updates and real-time scanning protect you from malware and phishing that could compromise your accounts. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Reduce your digital footprint and minimize risk by using services that remove your personal information from data brokers and people search sites, especially after a breach. These services make it harder for criminals to gather sensitive data used in social engineering attacks. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting a free scan to find out if your personal information is already out on the web: Periodically review your social media privacy and security settings to ensure they match your current needs. Platforms often add new settings and features, and staying up to date gives you the best protection. Avoid logging into accounts on public Wi-Fi or always use a VPN. Public networks make it easier for hackers to intercept your information. For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Regularly audit account access and revoke permissions for anyone who no longer needs it. This ensures that only trusted individuals can post or make changes on your behalf. The Elmo hack shattered more than just a cheerful digital persona. It reminded us that no brand, no matter how trusted, is immune to today's cyber threats. In an environment where trust is built tweet by tweet and lost in mere moments, protecting our digital presence has never been more urgent. Social media security is everyone's responsibility. Take action before you become the next viral lesson in what not to do. Do you think social media companies are doing enough to protect users and brands from evolving cybersecurity threats? Let us know by writing us at Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide -—free when you join my Copyright 2025 All rights reserved.