Posts Tagged ‘security’

edmodo accounts compromised

Edmodo Investigates Millions of User Accounts for Sale on Dark Web

By Sri Ravipati  05/12/17

https://thejournal.com/articles/2017/05/12/millions-of-edmodo-user-accounts-for-sale-on-dark-web.aspx

A hacker going by the name “nclay” claims to have stolen more than 77 million user accounts from Edmodo

LeakBase yesterday Tweeted that the top domains for the data breach include:

  • @gmail.com, accounting for 19 percent of the accounts at 13,286,240;
  • @hotmail.com, making up 10 percent of the accounts at 7,065,761; and
  • @yahoo.com, at 8 percent with 6,074,901 accounts.

+++++++++++++++++++++
more on Edmodo in this IMS blog
https://blog.stcloudstate.edu/ims?s=edmodo

student privacy

Report: Tech Companies Are Spying on Children Through Devices and Software Used in Classroom

By Richard Chang 04/17/17

https://thejournal.com/articles/2017/04/17/report-tech-companies-are-spying-on-children-through-devices-and-software-used-in-classroom.aspx

according to a new report from the nonprofit Electronic Frontier Foundation (EFF), “Spying on Students: School-Issued Devices and Student Privacy

shows that state and federal laws, as well as industry self-regulation, have failed to keep up with a growing education technology industry.

One-third of all K–12 students in the United States use school-issued devices running software and apps that collect far more information on kids than is necessary.

Resource-poor school districts can receive these tools at deeply discounted prices or for free, as tech companies seek a slice of the $8 billion ed tech industry. But there’s a real, devastating cost — the tracking, cataloging and exploitation of data about children as young as 5 years old.

Our report shows that the surveillance culture begins in grade school, which threatens to normalize the next generation to a digital world in which users hand over data without question in return for free services

EFF surveyed more than 1,000 stakeholders across the country, including students, parents, teachers and school administrators, and reviewed 152 ed tech privacy policies.

“Spying on Students” provides comprehensive recommendations for parents, teachers, school administrators and tech companies to improve the protection of student privacy. Asking the right questions, negotiating for contracts that limit or ban data collection, offering families the right to opt out, and making digital literacy and privacy part of the school curriculum are just a few of the 70-plus recommendations for protecting student privacy contained in the report.

+++++++++++++++++++++++++
more on students and privacy
http://blog.stcloudstate.edu/ims?s=student+privacy
http://blog.stcloudstate.edu/ims?s=privacy+government

https://www.privateinternetaccess.com/blog/2017/03/us-senate-votes-50-48-away-broadband-privacy-rules-let-isps-telecoms-sell-internet-history/

https://www.washingtonpost.com/news/the-switch/wp/2017/03/28/the-house-just-voted-to-wipe-out-the-fccs-landmark-internet-privacy-protections/?utm_term=.34ed3dce7494

 

mobile apps for libraries

Apps for Librarians: Empower Your Users with Mobile App Literacy eCourse
Nicole Hennig
Item Number: 1541-9076  Publisher: ALA Editions Price: $250.00

http://www.alastore.ala.org/detail.aspx?ID=11270&zbrandid=4634&zidType=CH&zid=42706629&zsubscriberId=1026665847&zbdom=http://ala-publishing.informz.net

Estimated Hours of Learning: 28
Certificate of Completion available upon request

Learning outcomes

After participating in this eCourse, you will:

  • Gain experience using some of the best apps available and understand how they enable learning
  • Learn how to evaluate and review mobile apps
  • Learn how tablets complement laptops, and how their capabilities are creating new learning opportunities
  • Learn how apps are being used by people with special needs, and where to find additional resources for learning more
  • Receive guidance for creating your own app guides, offering workshops, and advising colleagues

In this 5-week eCourse, you’ll learn about the most useful apps available on tablet and mobile devices and how they can be applied in your library to create the best learning experiences for your patrons and students.

Mobile apps are empowering for people of all ages and abilities. Contrary to the popular idea that apps are only useful for “consumption,” the best apps are being used effectively as tools to enable learning and knowledge creation. In this eCourse, Nicole Hennig will show you how to incorporate apps as learning tools at your library.

eCourse Outline

Week 1 – E-Reading

The Apps

  • Book reading
  • Magazine reading
  • Apps for Reading PDFs, web pages, and news feeds
  • Individual book apps

Readings & Discussion

  • Readings about e-reading & future of the book
  • Your thoughts on the readings (discussion forum)
  • Optional app review assignment

Week 2 – Productivity & Writing

The Apps

  • Productivity
    • Cloud storage, passwords, to do lists, notes
    • Handwriting, speech recognition, scanning, barcodes
  • Writing & Presenting
    • Word processing, spreadsheets, slides
    • More presentation apps

Readings & Discussion

  • Readings about security, writing, mobile apps in academia
  • Your thoughts on the readings (discussion forum)
  • Optional app review assignment

Week 3 – Reference

The Apps

  • Dictionaries, encyclopedias
  • Unit converters, maps, languages
  • Specialized reference apps
  • Subscription databases & citations

Readings & Discussion

  • Readings about jailbreaking, platforms, & mobile web
  • Apple’s iOS Human Interface Guidelines
  • Your thoughts on the readings (discussion forum)
  • Optional app review assignment

Week 4 – Multimedia

The Apps

  • Art viewing
  • Art creation
  • Photography and photo editing
  • Music listening
  • Music creation
  • Video viewing and editing

Readings & Discussion

  • Readings about technology & children
  • Your thoughts on the readings (discussion forum)
  • Optional app review assignment

Week 5 – Accessibility & More

Accessibility features of mobile devices

Readings & Discussion

  • Readings about assistive technology
  • Your thoughts on the readings (discussion forum)

Idea generation assignment

  • Ideas for using apps in library programs & services
  • Apps that wow

How this eCourse Works

The eCourse begins on June 5, 2017. Your participation will require approximately five to six hours a week, at times that fit your schedule. All activities take place on the website, and you will be expected to:

  • Read, listen to or view online content
  • Post to online discussion boards
  • Complete weekly assignments or activities

Instructor Nicole Hennig will monitor discussion boards regularly during the five-week period, lead group discussions, and will also answer individual questions. All interaction will take place on the eCourse site, which will be available 24 hours a day, 7 days a week. It’s recommended that students log into the site on the first day of class or within a few days for an overview of the content and to begin the first lesson.

+++++++++++++
more on mobile apps in this IMS blog
http://blog.stcloudstate.edu/ims?s=mobile+apps

Google AI

Google Researchers Create AI That Builds Its Own Encryption

BY TOM BRANT OCTOBER 28, 2016 04:45PM EST

http://www.pcmag.com/news/349154/google-researchers-create-ai-that-builds-its-own-encryption

Alice and Bob have figured out a way to have a conversation without Eve being able to overhear, no matter how hard she tries.

They’re artificial intelligence algorithms created by Google engineers, and their ability to create an encryption protocol that Eve (also an AI algorithm) can’t hack is being hailed as an important advance in machine learning and cryptography.

Martin Abadi and David G. Andersen, explained in a paper published this week that their experiment is intended to find out if neural networks—the building blocks of AI—can learn to communicate secretly.

As the Abadi and Anderson wrote, “instead of training each of Alice and Bob separately to implement some known cryptosystem, we train Alice and Bob jointly to communicate successfully and to defeat Eve without a pre-specified notion of what cryptosystem they may discover for this purpose.”

same in German

Googles AI entwickelt eigenständig Verschlüsselung

von – 31.10.2016
http://www.com-magazin.de/news/verschluesselung/googles-ai-entwickelt-eigenstaendig-verschluesselung-1145175.html
Google-Forscher Martin Abadi und David G. Andersen des Deep-Learning-Projekts “Google Brain” eine neue Verschlüsselungsmethode entwickelt beziehungsweise entwickeln lassen. Die Forscher haben verschiedene neurale Netze damit beauftragt, eine abhörsichere Kommunikation aufzustellen.

++++++++++++++++
more on AI in this IMS blog:
http://blog.stcloudstate.edu/ims?s=artificial+intelligence

private versus government

Hayden calls Russian email hack ‘honorable state espionage’

By Matt Leonard Oct 18, 2016

https://fcw.com/articles/2016/10/18/hayden-email-espionage.aspx?

The Department of Homeland Security and the Office of the Director of National Intelligence issued a joint statement earlier this month that condemned Russia for the attacks.

“Do not drop this in the cyber problem box, drop this in the Russia problem box,” Hayden suggested, saying the focus should be on the actor, not the means. “And by the way, that Russian problem box needs a bigger box, there’s a lot of stuff going on.”

Though there are aspects of cybersecurity that only government can handle, most of it will be driven by the private industry, Hayden said. Government can help the private sector by getting out of the way — removing liability, enabling legal protections, sharing information and redoing the classification system.

And since the government too depends on the private sector for security innovation, Hayden said he sides with Apple regarding whether the company should have to create a back door for the FBI to bypass iPhone encryption.

+++++++++++++++++

more on surveillance, government in this IMS blog:

http://blog.stcloudstate.edu/ims?s=surveillance

denial of sleep attacks

Security Tops List of Trends That Will Impact the Internet of Things

By David Nage 02/25/16

https://campustechnology.com/articles/2016/02/25/security-tops-list-of-trends-that-will-impact-the-internet-of-things.aspx

Are you ready to deal with “denial of sleep” attacks? Those are attacks using malicious code, propagated through the Internet of Things, aimed at draining the batteries of your devices by keeping them awake.

  1. Security. threats extend well beyond denial of sleep: “The IoT introduces a wide range of new security risks and challenges to the IoT devices themselves, their platforms and operating systems, their communications, and even the systems to which they’re connected.
  2. Analytics. IoT will require a new approach to analytics. “New analytic tools and algorithms are needed now, but as data volumes increase through 2021, the needs of the IoT may diverge further from traditional analytics,” according to Gartner.
  3. Device (Thing) Management. IoT things that are not ephemeral — that will be around for a while — will require management like every other device (firmware updates, software updates, etc.), and that introduces problems of scale.
  4. Low-Power, Short-Range IoT Networks. Short-range networks connecting IT devices will be convoluted. There will not be a single common infrastructure connecting devices.
  5. Low-Power, Wide-Area Networks. Current solutions are proprietary, but standards will come to dominate.
  6. Processors and Architecture. Designing devices with an understanding of those devices’ needs will require “deep technical skills.”
  7. Operating Systems. There’s a wide range of systems out there that have been designed for specific purposes.
  8. Event Stream Processing.  “Some IoT applications will generate extremely high data rates that must be analyzed in real time.
  9. Platforms. “IoT platforms bundle many of the infrastructure components of an IoT system into a single product.
  10. Standards and Ecosystems. as IoT devices proliferate, new ecosystems will emerge, and there will be “commercial and technical battles between these ecosystems” that “will dominate areas such as the smart home, the smart city and healthcare.

drones protection

Signal-Scrambling Tech ‘Freezes’ Drones in Midair

http://news.yahoo.com/signal-scrambling-tech-freezes-drones-midair-144743892.html

A new device that can detect, target and deter commercial drones could be used to keep the flying robots away from areas where they’re not wanted, like government properties, airports or your own backyard.

The new anti-drone system has been tested in the United Kingdom, the United States and France, according to the BBC. But there’s no word yet on when or where this drone-freezing technology could be used in these countries.

Fusking

Fusking = using a program to extract files names from a website that would seem obvious. Like 1.jpg, 2.jpg, etc. http://fusking.urbanup.com/3995415#.VVNxIdIMi54.

How hackers built software to steal naked photos from hundreds of women automatically

Read more: http://www.businessinsider.com/hackers-used-photofucket-to-hack-photobucket-and-steal-naked-photos-2015-5#ixzz3a2AIkoNT

The Dark Art Of “Fusking”

http://www.buzzfeed.com/katienotopoulos/the-dark-art-of-fusking

Fusking: Photobucket Fights Back Against Peeping Toms, Sends Takedown Notice To Reddit Pages

http://www.huffingtonpost.com/2012/08/16/fusking-photobucket-takedown-notice-reddit_n_1792472.html

1 2