Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged attack

Rss Feed Group items tagged

yc c

Digital Attack Map - 0 views

  •  
    Digital Attack Map One of the easiest ways to silence someone online is a distributed denial of service attack (DDoS). But it's difficult to solve a problem you can't see. Digital Attack Map visualizes the most powerful DDoS attacks happening in the world right now, using data from our partner Arbor Networks. DDoS attacks sometimes relate directly to events in the real world such as conflicts or political disputes. A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from banks to news websites, and present a major challenge to making sure people can publish and access important information.
D. Mignardi

New Smartphones and the Risk Picture - 3 views

  •  
    Mobile phone platforms are susceptible to malicious attacks, both from the ... more relevant than comparison of different smartphone brands. Attack Vectors .... types of cyber attacks that have proven extremely damaging to. DoD
Vicki Davis

The Associated Press: Video of Teen Beating Raises Questions - 0 views

  • But that doesn't mean YouTube or any other media company should get the blame, legally or ethically, for the attack, media experts said Friday.
  • The teenagers have been arrested on charges that they beat the teen so they could make a video of the attack to post online. One of the girls struck the 16-year-old victim on the head several times and then slammed her head into a wall, knocking her unconscious, according to an arrest report.
  • From a legal standpoint, YouTube and other online service providers are largely exempt from liability because of a 1996 anti-pornography law. One provision says Internet service providers are not considered publishers simply because they retransmit information provided by their users or other sources.
  • ...1 more annotation...
  • "There is no legal reason this video cannot be shown. It is obviously distasteful, abhorrent what the teenagers did to the victim, but it doesn't really make sense (to ask), 'Should YouTube have taken it down?'" Morris said.
  •  
    It is very important to review this case and learn what can happen to prevet this sort of behavior.
  •  
    This horrific attack that was videoed and posted on youtube for attention brings many questions and the public spotlight again goes onto the digital world we are creating. It is making its own "rules" which really aren't any. It is time for educators to speak out or be spoken to about what to or not to do.
Anne Bubnic

Teen Burned, Beaten in Cell Phone Video - 0 views

  •  
    A teenage girl from Illinois survived a brutal attack by her peers that was captured on cell phone video by a male student who did nothing to intervene. Mercedes Michaels was beaten, burned and had most of her hair cut off during the attack.
Anne Bubnic

Federal lawmaker targets cyber bullying - 0 views

  • "The Megan Meier Act would give prosecutors the tools t
  • Prompted by outrage over a Missouri teen's suicide after an internet hoax, United States Rep. Kenny Hulshof on May 22 introduced a bill that would impose federal criminal penalties for cyber bullying.
  • protect kids from the most egregious of online predatory attacks," Hulshof said in a statement.
  • ...2 more annotations...
  • The effort in Congress comes a week after Missouri lawmakers approved a bill making cyber harassment illegal. The state measure revises Missouri law to cover harassment via computers, text messages, and other electronic devices.
  • Hulshof's bill would allow federal prosecutors to go after online messages meant "to coerce, intimidate, harass, or cause emotional distress" to others. Those convicted under the measure would face a fine or up to two years in jail.
  •  
    Prompted by outrage over a Missouri teen's suicide after an internet hoax, United States Rep. Kenny Hulshof on May 22 introduced a bill that would impose federal criminal penalties for cyber bullying. "The Megan Meier Act would give prosecutors the tools to protect kids from the most egregious of online predatory attacks," Hulshof said in a statement. Hulshof's bill would allow federal prosecutors to go after online messages meant "to coerce, intimidate, harass, or cause emotional distress" to others. Those convicted under the measure would face a fine or up to two years in jail.
Anne Bubnic

Cyberbully Crackdown At Montclair School District - 0 views

  •  
    A Montclair school district is trying to protect its students from cyber bullies, even when they attack from home. CBS has learned how the school is cracking down and making the bullies the target.
Anne Bubnic

New Virus Attacks Facebook Friends - 0 views

  •  
    A malicious virus appears to have cracked the Facebook privacy firewalls and is sending thousands, perhaps hundreds of thousands of personal messages that appear to be from friend-to-friend, suggesting they are appearing in a YouTube video and providing the supposed link to view it.
Anne Bubnic

California AB 86 Assembly Bill - Pupil Safety - 0 views

  •  
    The California Department of Education (CDE) and the Office of the Attorney General (AG) co-administer the School/Law Enforcement Partnership program. The Partnership has funded the Kern County Office of Education for a five-year period to administer the statewide School Safety and Violence Prevention Training Grant. The grant provides for safe schools planning, bullying prevention, and crisis response training. This training program does not currently include prevention of bullying that occurs via electronic communication devices. Need for the bill : A poll commissioned in 2006 by Fight Crime: Invest in Kids, showed that one in three teens and one in six preteens have been victims of cyber bullying and that more than 2 million of those victims told no one about the attacks.
Anne Bubnic

Cybercrime Resources and Tips [Symantec Corp] - 0 views

  •  
    The threat landscape once dominated by the worms and viruses unleashed by irresponsible hackers is now ruled by a new breed of cybercriminals. Cybercrime is motivated by fraud, typified by the bogus emails sent by "phishers" that aim to steal personal information. The tools driving their attacks and fueling the blackmarket are crimeware - bots, Trojan horses, and spyware.
Anne Bubnic

Teens ID'd on MySpace plead to rape - 0 views

  •  
    Four suspects pleaded guilty to raping a Seattle-area girl who later identified two of her attackers on her MySpace page.
Anne Bubnic

Teacher Attacked by Student, Incident Recorded with Cell Phone - 0 views

  •  
    [April 8, 2008] Jolita Berry remembers all too well what happened last Friday. She had just finished having words with a female student, when things turned violent. Video taken by another student on a cell phone and posted on MySpace, clearly shows what happened next. In the video you can see a teenage student beating Jolita on the floor of her art class at Reginald F. Lewis High School
Kate Olson

The Dark Side of Web Anonymity - 0 views

  •  
    Malicious gossip posted by unidentified users is sparking a new debate about free speech online. As the legal debate rages, some students are trying another tactic to shut down anonymous gossip online: attacking the sites' business model. They're organizing boycotts of JuicyCampus and similar ventures, to cut off traffic and, by extension, ad revenue.
Anne Bubnic

How To Stop Cyber-Bullying - 0 views

  • Yet with so many different types of cyberbullying, ranging from online impersonation to e-mail hacking and distributing embarrassing materials about a person, it can be difficult for kids, let alone those trying to help them, to know how to respond and stop the 21st century bully in his or her tracks. "Awareness about the issue is high, but awareness about what to do when it happens is mixed," says Michele Ybarra, president and research director for Internet Solutions for Kids (ISK) and an adjunct faculty member at Johns Hopkins School of Public Health.
  • Research suggests that those on the receiving end of traditional bullying may be more likely to cyberbully as a form of retaliation. Kids involved in the more severe instances of cyberbullying also tend to have more psychosocial problems, exhibiting aggression, getting in trouble at school and having poor relationships with their parents, says Nancy Willard, an expert on cyberbullying and author of Cyberbullying and Cyberthreats. And while traditional bullying appears to peak in middle school and drop off as kids reach high school, cyberbullying tends to slightly increase among kids in high school, a trend researchers can't yet explain.
  • One of the tricky things about helping cyberbullying targets is that they aren't always willing to talk about the problem. Teens often cite a fear of having their Internet privileges revoked as a reason for keeping quiet, Agatston says. Kids who receive threatening messages in school may not divulge what's happened for fear of getting in trouble, since many schools ban use of cellphones during the day. To get around that problem, Willard recommends having a frank discussion with your children about cyberbullying before it happens.
  • ...1 more annotation...
  • Research is also beginning to show that just like traditional forms of bullying, cyberbullying can lead to anxiety, lower rates of self-esteem and higher rates of school absence, says Patti Agatston, a licensed professional counselor with the Prevention/Intervention Center, a student assistance program serving more than 100 schools in suburban Atlanta, Ga.
  •  
    Kids can be mean.\n\nIt's a fact of life we've all experienced. Gone are the days, however, when avoiding a bully meant ducking out of the back door at school. Thanks to personal computers, cellphones and instant messaging, it's now easier than ever for children to attack each other, often anonymously.
Marie Coppolaro

WiredSafety - Internet safety and help group - 0 views

  •  
    WiredSafety provides help, information and education to Internet and mobile device users of all ages. We help victims of cyberabuse ranging from online fraud, cyberstalking and child safety, to hacking and malicious code attacks. We also help parents with issues, such as MySpace and cyberbullying.
Anne Bubnic

Norton ranks riskiest cities for cybercrime - 0 views

  • Symantec then rated each city using different categories, such as risky online behavior (defined as buying items online and accessing financial information) and the number of cybercrimes per capita.
  •  
    Among 50 U.S. cities studied for their vulnerability to cybercrime, Seattle came out on top as the riskiest place, followed by Boston, Washington, D.C., and San Francisco, according to the report "Norton's Top 10 Riskiest Online Cities," released Monday. Results are based on the number of attempted hacking attacks and infected systems.
Anne Bubnic

Anti-Phishing Phil: Phishing Awareness Education - 2 views

  •  
    Anti-Phishing Phil™ is an engaging online game that teaches students and adults how to identify phishing URLs. The game was developed at Carnegie Mellon (in partnership with Wombat Security Technologies). Scientific evaluation has shown that Phil is more engaging than traditional training solutions and significantly more effective in terms of how well people are later able to detect phishing attacks and how long they remember what they have learned.
Anne Bubnic

Fight linked to Facebook post - 1 views

  •  
    A spat on Facebook over a recent killing might have led to a fight at Knightdale High School last week. Dominique Royster's Facebook page erupted into expletives and insults after Royster called for the release of Mariah Wisdom from jail. After her Facebook posting and the angry response, Royster received death threats on her cell phone. She was kept out of school for several days until emotions cooled, and her parents had a chance to talk to school administrators about the situation. A member of the school staff who deals with disciplinary problems was assigned to shadow her as she went through the day March 26, her first day back at school after the killing. Four students were cited with misdemeanor assault and released to their parents in connection with the attack.
yc c

Illumio Homepage - 0 views

  •  
    How Exposed Is Your Data Center? Your custom report will show you: A map of application communications, including those that are unauthorized Which of your high-value applications are vulnerable An action plan to quickly eliminate the attack surface inside your data center and cloud
Anne Bubnic

What to Do If Hackers Steal Your Online Accounts - 5 views

  •  
    Stolen accounts-caused by aggressive phishing attacks and distribution of malicious programs to collect passwords-have become a plague upon the Web. Spammers want them so their messages can get past spam filters. And crooks, who often lock out the true owners by changing their passwords, use them to find and get inside financial accounts or to impersonate the owners and weasel money out of their friends.
Anne Bubnic

Back to School Tips| Americans for Technology Leadership - 0 views

  • Cyberbullying Cyberbullying or online bullying is repeated, unwanted or cruel behavior against someone through computers, cell phones, gaming consoles, or other Internet-based means. The Internet is always “on,” opening the door for 24-hour harassment. Cyberbullies can be anonymous. They never have to confront their victims, they don’t have to be physically stronger and cyberbullies may be virtually invisible to parents and adults.
  • Look for warning signs your child may be the victim of cyberbullying – depression, lack of interest in school and friends, drop in grades and subtle comments that something may be wrong. If your child is the victim of cyberbullying, take action. By filtering email, instant messages and text messages, you can cut off many of the ways the cyberbullies contact your child. By having your child avoid the sites and groups where the attacks occur, he/she can ignore the bully. If harassment continues, change your child’s email address, user names and Internet account. If these steps do not stop the cyberbullying, contact the parents of the child who is behind the bullying, contact the school, and if the situation is not resolved, involve the police. It’s important to compile copies of harassing emails and postings to have evidence for authorities or the school, so they can take action. Look for signs that your child may be the cyberbully themselves – if they sign onto the Internet under someone else’s name, if they use someone else’s password without their permission, if they posted rude or mean things about someone else online, if they use bad language online, or if they changed their profile or away message designed to embarrass or frighten someone. Talk to your kids about cyberbullying and why it’s wrong and hurtful.
  •  
    As children go back to school, many parents are concerned about how their children will be using the computer and Internet devices in the classroom. Communication is key. Parents need to talk with their children about how to use the Internet safely, potential threats and appropriate usage of the Internet. By understanding both the benefits and the risks of Internet use, families can have a safer and more secure online experience. This article includes key tips on cyberbullying, internet safety, privacy and security.
1 - 20 of 24 Next ›
Showing 20 items per page