Understanding Hidden Threats: Corrupted Software Files Malicious code is not always hidden in web page scripts or unusual file formats. Attackers may corrupt types of files that you would recognize and typically consider safe, so you should take precautions when opening files from other people. What types of files can attackers corrupt? Prevent Identity Theft Advertisement If you have ever experienced identity theft yourself or even know someone who has, you know the experience can be a harrowing one. Criminals can open accounts in your name and impersonate you for a multitude of reasons – none of which are good.
be.macmillan - Work and cancer Please note that the Essential Work and Cancer Toolkit for employers (available below) comes with relevant resources inside. Additional copies of these resources can be ordered separately below. If you are an employer ordering the pack for the first time please do this at macmillan.org.uk/worktoolkit and you can also receive Macmillan’s work and cancer e-newsletters for employers. To promote support for people affected by cancer in your organisation create your own bespoke Work and Cancer poster. For more information about work and cancer please visit Macmillan.org.uk/work Staying Safe Online (2-3) Warm-up (5 minutes) ASK: What does it mean to be safe? Students’ answers will vary. DEFINE the Key Vocabulary term safe. ASK: When you walk down the street or play in your neighborhood without a trusted adult there, how do you stay safe? Gather all responses from students, but highlight these points:
Using Caution with Email Attachments While email attachments are a popular and convenient way to send documents, they are also a common source of viruses. Use caution when opening attachments, even if they appear to have been sent by someone you know. Why can email attachments be dangerous? Some of the characteristics that make email attachments convenient and popular are also the ones that make them a common tool for attackers: Email is easily circulated - Forwarding email is so simple that viruses can quickly infect many machines. Do students understand their ‘digital footprint’ and how it can affect their employability? Last year I presented to a group of 1st year Business School students on the topic of their use of Social Media and Social Networking websites and how this could have implications on their employability. Presentation: Social Media & how (students) can survive online (2010) This year I’ve been privileged enough to be invited back into lecture slots for all the first year under graduate Business School students (Law, Accounting & Finance, and Business). While the topic(s) and reflective activity the students are presented with are the same (including the majority of the responses given) the examples have been updated and improved … there are far more examples to choose from for a start! Click to view
Texting and driving: Gruesome safety video goes viral Graphic UK ad: Texting 2die4 WARNING GRAPHIC CONTENT: A British police force releases a shocking advert on the dangers of texting while driving. 27, 2009 A graphic British public service announcement about the dangers of sending text messages while driving has become an internet hit and sparked debate around the world. The Gwent police force in Wales said on Wednesday that an excerpt from a video it made for use in schools has been viewed more than 6 million times on YouTube and other websites since it was posted last month.
If technology is making us stupid, it's not technology’s fault There has been growing concern that computers have failed to live up to the promise of improving learning for school kids. The New York Times, The Washington Post, and PBS have all done stories recently calling into question the benefits of computers in schools. When computers fail kids, it’s too easy to blame the technology. And it’s disingenuous simply to cast aspersions on the kids. Those are responses that do little if anything to account for what is a much more layered set of conditions.
Preventing and Responding to Identity Theft Is identity theft just a problem for people who submit information online? You can be a victim of identity theft even if you never use a computer. Malicious people may be able to obtain personal information (such as credit card numbers, phone numbers, account numbers, and addresses) by stealing your wallet, overhearing a phone conversation, rummaging through your trash (a practice known as dumpster diving), or picking up a receipt at a restaurant that has your account number on it.
What Exactly Is Phishing & What Techniques Are Scammers Using? I’ve never been a fan of fishing, myself. This is mostly because of an early expedition to a pond where my cousin managed to catch two fish with a bamboo pole, while the fancy fiberglass-reinforced rod I had caught me zip, zero, nada. Similar to real-life fishing, phishing scams aren’t always best when they rely on advanced tactics, but there are many new techniques motivated by social networks. So what is phishing, and what should you be wary of?