Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged hacking

Rss Feed Group items tagged

Anne Bubnic

Student accused of hacking into computers, sending threatening messages - 1 views

  •  
    A Lehigh Acres teen is accused of hacking into a Lee County school's computer system and sending threatening messages to parents. The student is facing charges of two counts of an offense against intellectual property/modify without authority computer support document, each a third degree felony, and three counts of an offense against computer users/computer crime/interrupt or impair a governmental operation or public communication, each a second degree felony.
Anne Bubnic

Hack Is Wack! Snoop Dogg's Anti Cybercrime Rap Video Contest - 5 views

  •  
    Take a stand against cybercrime and enter the "Hack is Wack" cybercrime rap video contest. Contest ends September 30th. Might be an interesting high school activity.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

Teachable Moment: Student Hacking Experience - 0 views

  •  
    Made a mistake? Own it, Fix it, Learn from it." Learn how this teacher developed a student contract and handled the consequences of computer hacking attempts by her students.
Anne Bubnic

How I'd Hack Your Weak Passwords - 3 views

  •  
    f you invited me to try and crack your password, you know the one that you use over and over for like every web page you visit, how many guesses would it take before I got it?
Anne Bubnic

Man Arrested for Hacking Into Obama's Twitter - 0 views

  •  
    A Frenchman will face trial after hacking into Twitter accounts, including that of U.S President Barack Obama, a French prosecutor said.
Anne Bubnic

Norton ranks riskiest cities for cybercrime - 0 views

  • Symantec then rated each city using different categories, such as risky online behavior (defined as buying items online and accessing financial information) and the number of cybercrimes per capita.
  •  
    Among 50 U.S. cities studied for their vulnerability to cybercrime, Seattle came out on top as the riskiest place, followed by Boston, Washington, D.C., and San Francisco, according to the report "Norton's Top 10 Riskiest Online Cities," released Monday. Results are based on the number of attempted hacking attacks and infected systems.
Anne Bubnic

WEB|WISE|KIDS: MIRROR IMAGE [Interactive Software Adventure] - 0 views

  •  
    3rd in the Cybercop Series. MIRROR IMAGE tells the story of teenagers Sheena and Megan, best friends who are victimized by a criminal who uses the Internet to lure young women with promises of modeling contracts and online romance. Neither of the girls realizes that hacking software has been placed on their computers during their conversations with their 'online boyfriends.' Soon Sheena and Megan begin to suspect that someone is stalking them in real life. Players work with a detective to track the predator and arrest him. Available both as a home edition and a school edition. [Windows and Mac OSX versions available]
Anne Bubnic

Cyberethics for Teachers - 0 views

  •  
    Cyberethics curriculum and lesson plan created for elementary and middle school teachers by the Department of Justice. Covers computer crimes like hacking and pirating software or music.
Anne Bubnic

Videos - That's Not Cool - 0 views

  •  
    Videos From the National Teenage Dating Abuse Helpline targeting teens and covering topics such as electronic harrassment through excessive text messaging, badgering to send nude pictures and hacking the private spaces of others. Can be used as a springboard for discussion among kids.
Marie Coppolaro

WiredSafety - Internet safety and help group - 0 views

  •  
    WiredSafety provides help, information and education to Internet and mobile device users of all ages. We help victims of cyberabuse ranging from online fraud, cyberstalking and child safety, to hacking and malicious code attacks. We also help parents with issues, such as MySpace and cyberbullying.
Anne Bubnic

Mom Hacks Facebook Account; Teen Sues - 1 views

  • It was a mixed blessing that within 24 hours of creating her Facebook page, my kid was harassed unmercifully by a so-called friend — someone she thought was a friend in real life — to the point where she had to unfriend and block other communications from them. I couldn’t have made my case any better about the dangers of social media if I’d paid the obnoxious bully to do it for me.
  •  
    A teen has sued his mother for harassment after she logged into his Facebook account and changed content. He also claims she's made "slanderous" comments about him in Facebook as well. It's important to note that this 16-year-old lives with his grandmother and not his mother, and that he appears to be old enough to drive in his home state of Arkansas.
Anne Bubnic

Digital Citizenship: Monitoring Technology Use & Abuse [pdf] - 0 views

  •  
    THE JOURNAL (arcticle) by Mike Ribble and Gerald Bailey. Provides a five-step program for creating a digital citizenship program in your school.Over the last two years, it has become evident that a behavior pattern of misuse and abuse with respect to technology is \nbeginning to emerge in our society. This outbreak of \ntechnology misuse and abuse is documented in continual news \ncoverage on TV, in newspapers and on the Internet - both \ninside and outside of schools. The endless list of misuse and \nabuse includes hacking into school servers, using e-mail to \nintimidate or threaten students, illegally downloading music, \nplagiarizing information from the Internet, using cellular \nphones during class time, accessing pornographic Web sites, \nand playing video games during class. Therefore, if you are \nusing technology in your district, you must begin to deal with \ndigital citizenship in a significant way. \n
Anne Bubnic

Teachable Moments in Cyberbullying/Cyberethics - 109 views

Teachable Moment: Student Hacking Experience Made a mistake? Own it, Fix it, Learn from it." Learn how this teacher developed a student contract and handled the consequences of computer...

cyberethics students teachable moment

Anne Bubnic

The unvarnished truth about unsecured Wi-Fi - 2 views

  •  
    This article outlines the dangers of using unsecured WIFI networks both at home and with others. Hackers can access and capture sensitive data over your network.
Anne Bubnic

6 Tips for Facebook Security [Video] - 4 views

  •  
    Video produced by AVG Internet Security. Offers great privacy tips, scenarios and think-abouts for kids. Uses humor and exaggeration to make the point.
Anne Bubnic

Protecting Your Online Identity and Reputation - 0 views

  • Remember that nothing is temporary online. The virtual world is full of opportunities to interact and share with people around the world. It's also a place where nothing is temporary and there are no "take-backs." A lot of what you do and say online can be retrieved online even if you delete it — and it's a breeze for others to copy, save, and forward your information.
  • Mark your profiles as private. Anyone who accesses your profile on a social networking site can copy or screen-capture information and photos that you may not want the world to see. Don't rely on the site's default settings. Read each site's instructions or guidelines to make sure you're doing everything you can to keep your material private.
  • Safeguard your passwords and change them frequently. If someone logs on to a site and pretends to be you, they can trash your identity. Pick passwords that no one will guess (don't use your favorite band or your dog's birthday; try thinking of two utterly random nouns and mixing in a random number), and change them often. Never share them with anyone other than your parents or a trusted adult. Not even your best friend, boyfriend, or girlfriend should know your private passwords!
  • ...6 more annotations...
  • Don't post inappropriate or sexually provocative pictures or comments. Things that seem funny or cool to you right now might not seem so cool years from now — or when a teacher, admissions officer, or potential employer sees them. A good rule of thumb is: if you'd feel weird if your grandmother, coach, or best friend's parents saw it, it's probably not a good thing to post. Even if it's on a private page, it could be hacked or copied and forwarded.
  • Don't respond to inappropriate requests. Research shows that a high percentage of teens receive inappropriate messages and solicitations when they're online. These can be scary, strange, and even embarrassing. If you feel harassed by a stranger or a friend online, tell an adult you trust immediately. It is never a good idea to respond. Responding is only likely to make things worse, and might result in you saying something you wish you hadn't.
  • Take a breather to avoid "flaming." File this one under "nothing's temporary online": If you get the urge to fire off an angry IM or comment on a message board or blog, it's a good idea to wait a few minutes, calm down, and remember that the comments may stay up (with your screen name right there) long after you've regained your temper and maybe changed your mind.
  • Learn about copyrights. It's a good idea to learn about copyright laws and make sure you don't post, share, or distribute copyrighted images, songs, or files. Sure, you want to share them, but you don't want to accidentally do anything illegal that can come back to haunt you later.
  • Check yourself. Chances are, you've already checked your "digital footprint" — nearly half of all online users do. Try typing your screen name or email address into a search engine and see what comes up. That's one way to get a sense of what others see as your online identity.
  • Take it offline. In general, if you have questions about the trail you're leaving online, don't be afraid to ask a trusted adult. Sure, you might know more about the online world than a lot of adults do, but they have life experience that can help.
  •  
    Advice for teens from www.kidshealth.org. Here are some things to consider to safeguard your online identity and reputation:
    1. Remember that nothing is temporary online
    2. Mark your profile as private.
    3. Safeguard your passwords and change them regularly.
    4. Don't post inappropriate or sexually provocative pictures or comments.
    5. Don't respond to inappropriate requests
    6. Take a breather to avoid "flaming."
    7. Learn about copyrights.
    8. Check your digital footprint.
    9. Take it offline.
Anne Bubnic

Students' new best friend: 'MoSoSo' - 0 views

  • Mobile GPS will open a Pandora’s box of possibilities, say others. “I’d be very concerned about pedophiles or identity thieves hacking into a system and locating me, my wife, or daughter,” says Henry Simpson, who coordinates new technology for the California State University at Monterey Bay (CSUMB). “It raises huge safety issues,” he adds.
  • But new technologies have always brought new risks – such as identity theft. Philosophically, every technology has both positive and negative values, says Andrew Anker, vice president of development at Six Apart, a Web consulting firm. “In fact,” he points out, “the most positive aspects are what also add the most negative.”
  • Companies looking to do business on college campuses have paid particular attention to security concerns. Rave Wireless introduced a GPS/MoSoSo enabled phone for students this past year, emphasizing the security value of the GPS feature over its potential to deliver underage victims to predators. While the Rave phones enable students to find like-minded buddies (Bored? Love Indian food? Meet me under the clock!), it also offers a cyberescort service linked to campus police. If the student doesn’t turn off a timer in the phone, indicating safe arrival at a destination, police are dispatched to a GPS location.
  •  
    Talking on cellphones is passé for students who use them for networking and sending photos. Mobile Social Networking Software - the next wave of virtual community - is already appearing on cellphones, beginning with college campuses. These under-25s (the target market for early adoption of hot new gadgets) are using what many observers call the next big consumer technology shift: Mobile Social Networking Software, or Mososo. The sophisticated reach of cyber-social networks such as MySpace or Facebook, combined with the military precision of GPS, is putting enough power in these students' pockets to run a small country.
Anne Bubnic

Teen Harrassed By Older Men After MySpace Page Hacked - 0 views

  •  
    Latest story of an 8th grade student being harassed online after giving her password to some friends. After a falling out, they sabotaged her MySpace page, changed her password info and proceeded to post sexually provocative information.
Anne Bubnic

Teen Hacker Could Get 38-Year Sentence for Fixing Grades - 0 views

  • Omar Khan, 18, a student at Tesoro High School in Rancho Santa Margarita, now faces 34 felony counts of altering a public record, 11 felony counts of stealing and secreting a public record, seven felony counts of computer access and fraud, six felony counts of burglary, four felony counts of identity theft, three felony counts of altering a book of records, two felony counts of receiving stolen property, one felony count of conspiracy and one felony count of attempted altering of a public record.
  •  
    They may be just kids, but two Orange County, Calif., teens are accused of committing a whole bunch of grown-up crimes. The allegations include hacking into school computers to change grades and planting spyware on a district computer. One of them faces 69 felony charges, which could land him in prison for up to 38 years if he's convicted.
1 - 20 of 27 Next ›
Showing 20 items per page