Net Threats Experts say liberty online is challenged by nation-state crackdowns, surveillance, and pressures of commercialization of the Internet As Internet experts look to the future of the Web, they have a number of concerns. This is not to say they are pessimistic: The majority of respondents to this 2014 Future of the Internet canvassing say they hope that by 2025 there will not be significant changes for the worse and hindrances to the ways in which people get and share content online today. And they said they expect that technology innovation will continue to afford more new opportunities for people to connect. Still, some express wide levels of concern that this yearning for an open Internet will be challenged by trends that could sharply disrupt the way the Internet works for many users today as a source of largely unfettered content flows. The Net Threats These Experts Fear
How to Keep Your Personal Information Secure Protecting your personal information can help reduce your risk of identity theft. There are four main ways to do it: know who you share information with; store and dispose of your personal information securely, especially your Social Security number; ask questions before deciding to share your personal information; and maintain appropriate security on your computers and other electronic devices. Keeping Your Personal Information Secure Offline Lock your financial documents and records in a safe place at home, and lock your wallet or purse in a safe place at work.
10 ways schools are teaching internet safety "The student’s job is to figure out which website is the hoax. After students have looked at all three websites and figured out which one is the hoax, they share what they found with their classmates," says one reader in describing a hands-on lesson. As internet use has become a daily part of most students’ lives, students must know how to protect themselves and their identity at all times—especially when teachers and parents aren’t there to help them. Teaching students about internet safety has been important for as long as the internet has existed, but it’s in the spotlight this year in particular as schools get ready to apply for 2012 eRate discounts on their telecommunications services and internet access. That’s because applicants must amend their existing internet safety policies by July 1, 2012, to include information about how they are educating students about proper online behavior, cyber bullying, and social networking sites.
Computer Virus Information What is a computer virus? Think of a biological virus – the kind that makes you sick. It’s persistently nasty, keeps you from functioning normally and often requires something powerful to get rid of it. A computer virus is very similar. Designed to relentlessly replicate, computer viruses infect your programs and files, alter the way your computer operates or stop it from working altogether. It’s estimated that the Conficker virus infected more than 10 million computers in 2009. Malware Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Malware is defined by its malicious intent, acting against the requirements of the computer user, and does not include software that causes unintentional harm due to some deficiency. The term badware is sometimes used, and applied to both true (malicious) malware and unintentionally harmful software. In law, malware is sometimes known as a computer contaminant, as in the legal codes of several U.S. states. Spyware or other malware is sometimes found embedded in programs supplied officially by companies, e.g., downloadable from websites, that appear useful or attractive, but may have, for example, additional hidden tracking functionality that gathers marketing statistics. Purposes Malware by categories on 16 March 2011.
Privacy, security threats in the 'Internet of Things' If HIPAA is helpless in protecting information on fitness trackers, and voice-controlled TVs, smart thermostats and Internet-accessible appliances do almost nothing to ensure privacy, what will the convenience of connected things eventually cost consumers? The Federal Trade Commission warned last month about the serious privacy and data security risks, noting that the number of Internet-connected devices will double, to 50 billion, by 2020. We chatted with Shaun Murphy, a former Department of Defense communication systems security consultant who this year is launching PrivateGiant, an online-security firm. He says the threat is potentially greater than personal information giveaways on Facebook and other social media.
10 Important Password Tips Everyone Should Know Your bank data, your accounts, your email, and your life are all wrapped up in your ability to create secure passwords and remember them. And yet most educators (and their students) struggle to remember passwords. With so many passwords stolen, there are things all of us SHOULD know to make our identities and bank accounts safer. Mark Burnett, author of the most commonly used passwords wordcloud featured on this post, says that the top 10,000 passwords represent 98.8% of all users. (This was said before services like Last Pass began being used.) So this means that if a hacker has those 10,000 passwords and takes a crack at your account, then 98.8% of us are at risk.
Big Brother goes to school Parents expect schools to keep track of their kids. But in the digital era, keeping track is vastly different than it was a generation ago, thanks to Big Data analytics. According to its advocates, this is a very good thing. Gathering individual information on students can lead to “personalized” and “adaptive” learning platforms.
Apple iOS Now Targeted In Massive Cyber Espionage Campaign Attack campaign tied to Russia now zeroing in on mobile user's iPhones, iPads. An extensive and sophisticated cyber espionage operation targeting mainly Western military, government, defense industry firms, and the media, now has a new weapon: a spyware app for Apple iPhones and iPads. Operation Pawn Storm, which has been tied to Russia by at least one security research firm, is using a specially crafted iOS app to surreptitiously steal from the mobile device text messages, contact lists, pictures, geo-location information, WiFi status of the device, lists of installed apps and processes -- and to record voice conversations, according to new Trend Micro research. "The Cold War has returned in cyberspace, and Apple has become the gateway to western elites," says Tom Kellermann, chief cyber security officer with Trend Micro. "Pawn Storm has evolved to now incorporate proximity attacks against Western victims." "We found two malicious iOS applications in Operation Pawn Storm.
FTC sees privacy threats in the 'Internet of Things' - Katy Bachman - POLITICO As consumers buy up fitness trackers, Internet-connected thermostats and even Web-enabled cars and toothbrushes, the Federal Trade Commission has a message: It’s watching. The agency is warning that as millions of new smart devices make people’s daily lives more convenient, they’re also collecting reams of personal information that raise new privacy and data security concerns. Story Continued Below The nascent sector — known as the “Internet of Things” and embraced by companies from Google to Intel — is still largely unregulated, and the FTC is hoping a set of recommendations it released Tuesday will goad companies into building consumer data protections into their systems. “The only way for the Internet of Things to reach its full potential for innovation is with the trust of American consumers,” said FTC Chairwoman Edith Ramirez. Not all the commission members are on board with her campaign.
Mobile Malware: Small Numbers, but Growing THE warning was dire: A small security company revealed a flaw in millions of smartphones that could allow dangerous software to masquerade as a legitimate app and seize control of a phone. The threat was a big conversation topic at this year’s Black Hat security conference. But after that, we didn’t hear much more about it. Perhaps that should not be surprising. For some time, computer security companies have been on the lookout for apps meant to do harm to smartphones. But for all the concern, so-called mobile malware has not had much of an impact on regular people.
Cyber Bullying Statistics Cyber bullying statistics refers to Internet bullying. Cyber bullying is a form of teen violence that can do lasting harm to young people. Bullying statistics show that cyber bullying is a serious problem among teens. The Teacher's Guide To Keeping Students Safe Online This is the second in a series of online safety discussions. Please be sure to check out Jill Rooney’s recent article for Edudemic ‘The Student’s Guide To Staying Safe Online” for even more tips and tricks. Most students are familiar with and active users of mobile technology. While it does facilitate sharing and knowledge exchange, it can be a dangerous tool if improperly used. By this I mean students using their smartphones (or dumbphones, for that matter) to share things they would never normally share.