Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged identity theft

Rss Feed Group items tagged

Anne Bubnic

Teen Hacker Could Get 38-Year Sentence for Fixing Grades - 0 views

  • Omar Khan, 18, a student at Tesoro High School in Rancho Santa Margarita, now faces 34 felony counts of altering a public record, 11 felony counts of stealing and secreting a public record, seven felony counts of computer access and fraud, six felony counts of burglary, four felony counts of identity theft, three felony counts of altering a book of records, two felony counts of receiving stolen property, one felony count of conspiracy and one felony count of attempted altering of a public record.
  •  
    They may be just kids, but two Orange County, Calif., teens are accused of committing a whole bunch of grown-up crimes. The allegations include hacking into school computers to change grades and planting spyware on a district computer. One of them faces 69 felony charges, which could land him in prison for up to 38 years if he's convicted.
Anne Bubnic

i-SAFE Lesson Guide: Phishing for Information - 0 views

  •  
    Download this lesson plan from I-Safe which introduces students to the term phishing and the threat of identity theft associated with this type of e-mail. Students will:
    *understand the term phishing and the types of e-mail it applies to
    * understand the security risks associated with this type of message
    *engage in an activity to reinforce concepts by sharing information with others
Anne Bubnic

Ghosts in the Browser: Computer and Network Security - 1 views

  •  
    Rising concerns about computer security are evident in the San Jose Mercury News three-part series which focused on everything from phishing schemes and identity theft to student safety on the Internet. In many districts, technology directors are finding they have to do more and more to insure that data is not compromised and to see that students are not using school networks to access inappropriate content.
    Part I: How online crooks put us all at risk
    Part II: How well are we protecting ourselves?
    Part III: U.S. targets terrorists as online thieves run amok

Anne Bubnic

Sorted: Keep Your Information Secure Online - 0 views

  •  
    From Childnet International, this site aims to give students advice and information on computer security issues in a practical and simple way. It was created by an 18 year old and addresses topics like spyware, adware, trojans and viruses, spam and phishing, identity theft, pop-ups and file-sharing. It would be best suited for high school students.
Anne Bubnic

An Educator's Guide To Responsible Technology Use [pdf] - 3 views

  •  
    26 page guide for Educators on Safety, Security and Ethics produced for K-12 students and teachers by the IIIA/James Madison University in cooperation with the Office of Ed Tech for the State of Virginia. Covers digital communication topics like ethics, digital footprint, flaming, spyware, viruses, hoaxes, spoofing & phishing, spam, identity theft, privacy, cyberpredators, social networking, gaming, and bullying via cell phone.
Anne Bubnic

A Facebook Identity Theft [video] - 1 views

  •  
    Teachable moment in which a teen on Facebook filled out car loan applications to get extra points in an game online. The son foolishly gave out personal family information.
Vicki Davis

Identity Theft Leads to Child-Porn Arrest Nightmare - 0 views

  • Simon Bunce of Hampshire, England, not only had his credit-card number stolen online but was arrested and falsely accused of being a pedophile when that card number was used to buy child pornography.
  • Yet that only came after he'd lost his $250,000-a-year job, his father and siblings stopped talking to him and his computer was taken away for several months, the BBC reports. Bunce had the misfortune of being caught up in Operation Ore, a massive British online kiddie-porn crackdown in 2003 that itself grew out of Operation Avalanche, an earlier American bust which began with a 1999 raid on Landslide Productions, a Texas mom-and-pop operation that handled credit-card transactions for porn Web sites.
  • about 7,200 people — whose card numbers showed up on the list.
  • ...2 more annotations...
  • Bunce was arrested "on suspicion of possessing indecent images of children, downloading indecent images of children and incitement to distribute indecent images of children" — all before a single image of such had been found on his computers at home and at work. He quickly found himself unemployed and estranged from his family. But his wife stuck by him, and while his computer sat in police custody waiting to be examined, Bunce took action.
  • Bunce used the U.S. Freedom of Information Act and a catalog of Internet Protocol addresses to establish that his credit-card number had been used in Jakarta, Indonesia, to buy child pornography online at the same moment he used the card to pay the bill at a London restaurant.
  •  
    Learning how to safely use e-commerce websites is important, but also, people need to be aware to protect their credit card numbers and identities as can be seen in this horrific case study. When websites are not safe about their use of credit card numbers, it can have horrible impacts such as this man losing his $250,000 a year job and becoming estranged from his family, when they thought he bought child pornography.
Anne Bubnic

R U Cybersafe? (K-12) - 0 views

  •  
    Click on the buttons in the Blue Menu for carefully selected and annotated resources in each of our six CyberSafety areas: identity safety, cyberbullying, cyber predators, piracy & plagiarism, inappropriate content, social networks.
Anne Bubnic

Who's Keeping Students Safe Online? - 0 views

  • Fewer than 25 percent of educators feel comfortable teaching students how to protect themselves from online predators, cyberbullies and identity thieves, says a new study from the National Cyber Security Alliance (NCSA) and Educational Technology, Policy Research and Outreach (ET PRO).
  • The study found that 90 percent of educators have received fewer than six hours of professional development on cybersecurity over the past year but that more than 60 percent are interested in learning more about cybersecurity, or C3, issues, with cybersafety rated as their highest priority.
  •  
    Fewer than 25 percent of educators feel comfortable teaching students how to protect themselves from online predators, cyberbullies and identity thieves, says a new study from the National Cyber Security Alliance (NCSA) and Educational Technology, Policy Research and Outreach (ET PRO).
Anne Bubnic

Facebook ID Theft Story 2 - 0 views

  •  
    Story of a FaceBook account that was hijacked. The criminal promptly changed all of he log-in information, impersonated the account owner, and sent requests to all of his friends for money. He claimed he was in London and his wallet had been stolen so he needed people to wire him money, ASAP.
Anne Bubnic

Students' new best friend: 'MoSoSo' - 0 views

  • Mobile GPS will open a Pandora’s box of possibilities, say others. “I’d be very concerned about pedophiles or identity thieves hacking into a system and locating me, my wife, or daughter,” says Henry Simpson, who coordinates new technology for the California State University at Monterey Bay (CSUMB). “It raises huge safety issues,” he adds.
  • But new technologies have always brought new risks – such as identity theft. Philosophically, every technology has both positive and negative values, says Andrew Anker, vice president of development at Six Apart, a Web consulting firm. “In fact,” he points out, “the most positive aspects are what also add the most negative.”
  • Companies looking to do business on college campuses have paid particular attention to security concerns. Rave Wireless introduced a GPS/MoSoSo enabled phone for students this past year, emphasizing the security value of the GPS feature over its potential to deliver underage victims to predators. While the Rave phones enable students to find like-minded buddies (Bored? Love Indian food? Meet me under the clock!), it also offers a cyberescort service linked to campus police. If the student doesn’t turn off a timer in the phone, indicating safe arrival at a destination, police are dispatched to a GPS location.
  •  
    Talking on cellphones is passé for students who use them for networking and sending photos. Mobile Social Networking Software - the next wave of virtual community - is already appearing on cellphones, beginning with college campuses. These under-25s (the target market for early adoption of hot new gadgets) are using what many observers call the next big consumer technology shift: Mobile Social Networking Software, or Mososo. The sophisticated reach of cyber-social networks such as MySpace or Facebook, combined with the military precision of GPS, is putting enough power in these students' pockets to run a small country.
Anne Bubnic

ClubSymantec: Safety and Security Library [Feature Articles] - 1 views

  •  
    ClubSymantec is a safety and security resource center for Internet security and other computer related topics. Great advice and many topics here that could be assigned to students for presentation. Resources include advice on identity protection, password security, shopping safely online, spam control, spyware, phishing scams etc.
Anne Bubnic

What to Do If Hackers Steal Your Online Accounts - 5 views

  •  
    Stolen accounts-caused by aggressive phishing attacks and distribution of malicious programs to collect passwords-have become a plague upon the Web. Spammers want them so their messages can get past spam filters. And crooks, who often lock out the true owners by changing their passwords, use them to find and get inside financial accounts or to impersonate the owners and weasel money out of their friends.
Anne Bubnic

Three in four parents spy on children online - 0 views

  •  
    Children as young as eight are being attracted to social networking sites such as Facebook, Myspace and Bebo, with a new study revealing more than 750,000 between the ages of 8 and 12 use one, despite minimum age restrictions of 13 or 14. Parents have admitted to spying on their children online in an attempt to safeguard them from the dangers of social networking websites.
Anne Bubnic

Top 8 workarounds of kid virtual-world users - 0 views

  • The Atlanta-based parenting columnist, former elementary school teacher, kids' pop culture expert, author, and mother of four spent a couple of weeks in Club Penguin to learn what her eight-year-old son might experience there. She didn't like everything she saw.
  •  
    Anne Collier [NetFamilyNews] reports on the Top 8 workarounds of kid virtual-world users - as relayed by Sharon Duke Estroff, who spent a couple of weeks on Club Penguin observing what her 8-year-old son might experience there.
Anne Bubnic

Article Library: Cyber Bullying, Cyber Ethics, Online Addiction - 0 views

  •  
    This amazing library collection of cybersafety and cyberethics articles from Symantec would make a great resource for teachers who want to assign students different topic areas for student presentations in a digital citizenship class.
Judy Echeandia

Schools caught in internet safety dilemma [eSchool News, Nov. 17, 2008] - 0 views

  •  
    Solutions such as eGuardian could provide greater protection for kids, but at what cost (e.g., market profiling)?
Anne Bubnic

Safe Practices for Life Online [New ISTE book] - 0 views

  •  
    Contains dozens of classroom-tested exercises and hundreds of links to Web sites, documents, and resources, Safe Practices for Life Online offers practical advice to help middle and high school students stay safe by making better choices and minimizing their risks.
Anne Bubnic

Technology: Cyber Security - 0 views

  •  
    Teaching cyber security with a focus on safety and ethics has grown rapidly in importance over the past few years. Securing your personal computer and protecting classroom computers plays a crucial role in protecting our nation's Internet infrastructure.
‹ Previous 21 - 40 of 62 Next › Last »
Showing 20 items per page