Archive of ‘hacker’ category

Protect Student Data

Six Ways to Protect Student Data and Prevent Cyberattacks

By Ricky Doyle     Dec 10, 2018

https://www.edsurge.com/news/2018-12-10-six-ways-to-protect-student-data-and-prevent-cyberattacks

School administrators and IT staff can be super-vigilant, but the hackers are getting better and better at sneaking through security.

the most common cybersecurity threats, and how can school staff avoid them?

Eavesdropping / Man-in-the-Middle (MiTM) Attacks

What they are: It’s likely that you sometimes use a school laptop or mobile device to gain internet access via Wi-Fi networks in public places like coffee shops or airports. If so, be aware that there may be hackers eavesdropping to try and gain entry to any two-party exchange you make so they can filter and steal data.

How to avoid them: Always use a school-verified SIM carddongle or VPN(virtual private network) to access the internet in public places.

Social Engineering Attacks

According to Verizon’s 2018 Breach Investigations report, 92 percent of malware is delivered via email, often referred to as social engineering attacks. The aim is to interact with the user and influence and manipulate their actions to gain access to systems and install harmful software. Malware uses various guises. Here are some of the most common:

1. Phishing emails

2. Baiting attacks

3. Quid pro quo requests

4. Pretexting attacks

5. Contact with a ‘compromised’ website

Malware, Phishing, Hacking, Ransomware

Keeping Safe in a Digital World

How Not to be Hacked

Malware, Phishing, Hacking, Ransomware – oh my! Learn about the threats to you, your users and your library.  During this session, we will explore the threats to online security and discuss solutions that can be implemented at any level. Most importantly, we will look at how we can educate our users on current threats and safety

Date: December 5th, 10AM

Presenter: Diana Silveira

Register: https://netforum.avectra.com/eweb/DynamicPage.aspx?Site=SEFLIN&WebCode=EventDetail&evt_key=bec597af-02dd-41a4-9b3a-afc42dc155e4

Webinar December 5, 2017 10 AM

  • create policies. e.g. changing psw routinely
  • USB blockers for public computers (public libraries). like skimmers on gas stations
  • do not use admin passwords
  • software and firmware updates.
  • policy for leaving employees
  • HTTP vs HTTPS
  • Cybersecurity KNowledge Quiz Pew research Center
    http://www.pewinternet.org/quiz/cybersecurity-knowledge/ 

diana@novarelibrary.com

slideshare.net/dee987

facebook.com/novarelibrary

twitter @Novarelibrary

+++++++++++
more on hacking in this IMS blog
http://blog.stcloudstate.edu/ims?s=hacker

hacking voting

A Voice Cuts Through, and Adds to, the Intrigue of Russia’s Cyberattacks

++++++++++++++++++++
more on Eastern European hackers in this IMS blog:
http://blog.stcloudstate.edu/ims/2016/06/22/ukrainian-hacker-and-fbi/

hack the drones

Hackers are able to seize control of consumer drones and make them fall from the sky

https://plus.google.com/+ScrewMuggz/posts/KMtnAxhMYtc

there aren’t clear rules about what manufacturers need to do to secure drones to prevent them from being tampered with by malicious hackers.

Police have owned signal jamming tools to interfere with consumer drones for years. After all, it was a regular consumer drone that a member of ISIS turned into a kamikaze to bomb Kurdish fighters.

My note: from jamming devices, to raptors (birds) to hacking the apps – #BumpyRoad for drones

+++++++++++++++++
more on drones in this IMS blog:
http://blog.stcloudstate.edu/ims?s=drones

hackers versus crackers: Guccifer

Hackers versus crackers

http://www.techrepublic.com/blog/it-security/hacker-vs-cracker/

http://www.pctools.com/security-news/crackers-and-hackers/

Federal court sentences original Guccifer

By Mark Rockwell Sep 02, 2016

https://fcw.com/articles/2016/09/02/guccifer-sentence-rockwell.aspx

+++++++++++++++++

more in this blog on hackers and crackers

http://blog.stcloudstate.edu/ims?s=hackers

http://blog.stcloudstate.edu/ims?s=crackers

 

your social media account cracked

This is what happens when someone hacks your Spotify account

Gaming and Education: Resources

Gaming Learning Society
https://www.gameslearningsociety.org/

Report from the intersection of Games, Learning, and Society
http://remakelearning.org/blog/2014/06/19/games-learning-society-recap/
Games, Learning and Society conference in Madison, Wisconsin. practical ideas and arguments from GLS to help you get through the roadblocks that stand between you and learning or teaching through games.

keywords: gamification + library in Twitter:
Readers Save Legacy Library Content by Crowdsourcing Metadata Games
http://www.gamification.co/2014/05/12/readers-save-legacy-content-by-crowdsourcing-metadata-games/What is Gamification and Why Use It in Teaching?
http://ii.library.jhu.edu/2014/05/13/what-is-gamification-and-why-use-it-in-teaching/What Does the Next-Generation School Library Look Like?
http://blogs.kqed.org/mindshift/2014/06/what-does-the-next-generation-school-library-look-like/
The library now also has reading lounge areas with comfortable modular seating, as well as tables with chairs and stools that students are free to move around; two music studios; a HackerSpace (with high-tech equipment such as a microscope, 3D printer, gaming hardware and software, and a green screen for filming) and a Maker Space that also houses a 3D printer and serves as a “hands-on” craft room where old technology can be disassembled and re-configured with other materials. In short, the Monticello Library Media Center has become a “Learning Commons.”

following now @valibrarian because of MineCraft http://t.co/RnwW7ahOK2
Minecraft and the library: http://blogs.curtin.edu.au/gamification/news/minecraft-and-the-library/

Library Quest Wrap-Up and Post-Game Assessment
https://babeltech.wordpress.com/2014/03/25/library-quest-wrap-up-and-post-game-assessment/

If you build it …? One campus’ firsthand account of gamification in the academic library
http://crln.acrl.org/content/74/4/208.full
Straight from CRL News
SCVNGR as a platform was attractive to us for several reasons, including UCSD’s experience. First, it incorporated gaming into students’ experience of the library, which has been widely explored and recommended as a way to engage library patrons.2,3 Second, it would enable us to connect with students early in the year without needing to commit personnel to lengthy tours and other scheduled services during a busy time.

Pls consider former IMS blog entries. Keyword: “game”:
http://blog.stcloudstate.edu/ims/?s=game

 

Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”

The prowess of these three crackers also underscores the need for end users to come up with better password hygiene. Many Fortune 500 companies tightly control the types of passwords employees are allowed to use to access e-mail and company networks, and they go a long way to dampen crackers’ success.

http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords