Web 3.0 is the third generation of internet services which provide websites and applications with the technology to run. Web 3.0 is set to be powered by AI and peer-to-peer applications like blockchain. The key difference between Web 2.0 and Web 3.0 is that Web 3.0 is more focused on using innovative technologies like machine learning and AI to create more personalized content for each user. It is also expected that Web 3.0 will be more secure than its predecessors because of the system it is built upon.
Blockchains are made up of blocks that store information. Each block has a unique “hash” that differentiates it from other blocks. These blocks are then connected by a chain in chronological order. The information stored in these blocks is permanent, which makes it a very secure way to complete online transactions.
This is why cryptocurrencies, like Bitcoin, are built on blockchain technology.
The Internet of Things’ Persistent Security Problem
The threat of ransomware
IoT’s special vulnerabilities
Potential solutions
In what is currently a fragmented regulatory and standards landscape internationally, the EU has taken strongest interest in IoT, but from a competition perspective. The EU Commission is investigating competition questions related especially to the three dominant voice-assistants (Alexa, Google Assistant, Siri), a node for issues of data privacy and interoperability. Its recently released report hardly mentions security.
“This measure will provide additional options for students and the recently unemployed to engage with higher education across a wider range of fields, which will help further the position of the nation and our workforce to move out of the economic downturn,” a department spokesman said.
“There is some crossover between the terms ‘micro-credential’ and ‘short course’; both are generally something shorter than a full qualification. The short courses are a type of micro-credential. The short course is a credit-bearing micro-credential, meaning that it can be used to ‘stack’ into a full qualification at a later time.”
” The Australian Cyber Security Growth Network said the cyber security workforce had grown by 4000 to 26,500 since 2017. The sector grew by 6 per cent a year, compared with overall national growth of 2 per cent a year.”
The National Security Commission on AI warned in a 756-page report on Monday that China could soon replace the U.S. as the world’s “AI superpower” and said there are serious military implications to consider.
The 15 members of the commission include technologists, national security professionals, business executives and academic leaders. Among them are Amazon’s next CEO, Andy Jassy, Oracle CEO Safra Catz, Microsoft Chief Scientific Officer Eric Horvitz and Google Cloud AI chief Andrew Moore.
A minimal-data practice will enable several AI-driven industries — including cyber security, which is my own area of focus — to become more efficient, accessible, independent, and disruptive.
1. AI has a compute addiction. The growing fear is that new advancements in experimental AI research, which frequently require formidable datasets supported by an appropriate compute infrastructure, might be stemmed due to compute and memory constraints, not to mention the financial and environmental costs of higher compute needs.
MIT researchers estimated that “three years of algorithmic improvement is equivalent to a 10 times increase in computing power.”
Until recently, the .su domain has been the home of weird, but legitimate sites. But when the administrators for Russia’s .ru got a little more strict about what they would and wouldn’t allow, scammers and hackers alike began to migrate to the out-dated .su, which saw its population of sites double in 2011, and again in 2012.
++++++++++++++
Old Soviet Union domain name attracts cybercriminal interest
the New York Department of Financial Services (DFS) has released an investigation report on Twitter. This report outlines the high profile attack that overtook popular celebrity accounts (including former U.S. president Barack Obama, celebrity and businesswoman Kim Kardashian West, Amazon mogul Jeff Bezos, and other notable celebrities) and led to the theft of US$ 118,000 in bitcoin.
DFS has called on the U.S. government to regulate social media platforms, such as Twitter and Facebook, on cybersecurity, along with antitrust and content moderation.
In 2014, there were 1 million unfilled cybersecurity jobs globally. By 2021, it’s estimated that number will grow to 3.5 million. Exposing K-12 students to cybersecurity through a well-designed curriculum and set of activities will help alleviate the shortage by increasing the interest and skills of the new generation. Unfortunately, current secondary school curricula across the country leave students and educators with minimal or no exposure to cybersecurity topics.
Many K-12 school districts are looking for ways to create cybersecurity training programs. This edWebinar will focus on best practices for teaching and learning cybersecurity skills, including the following learning objectives:
What skills does the instructor need to teach an introductory cybersecurity course?
What are some best practices for teaching an introductory cybersecurity course?
Where can instructors get help teaching their courses?
What tools/resources do students and instructors need to teach an introductory cybersecurity course?
This edWebinar will be of interest to middle school through higher education teachers and school and district leaders. There will be time to have your questions answered at the end of the presentation. Learn more.